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", 0x1000, 0x8000, 0x1, {0x0, r8}}, 0xd424) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffff7e9}, 0x0, 0x0, 0x0, 0x7, 0x5, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r9, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 579.786750] audit: type=1326 audit(1727032373.782:109): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5580 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:12:53 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r3, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) readv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000500)=""/218, 0xda}, {&(0x7f0000000a00)=""/236, 0xec}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/131, 0x83}], 0x6) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) 19:12:53 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:12:53 executing program 2: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:12:53 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:12:53 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:12:53 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 579.835294] Module has invalid ELF structures 19:12:53 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:12:53 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(0x0, 0x0, 0x2001) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7002) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f00000004c0)={{r2}, "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"}) r3 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000001780)={{0x2, 0x0, @remote}, {0x308, @multicast}, 0xac1414bb, {0x2, 0x0, @broadcast}}) fallocate(r3, 0x1d, 0xfffffffffffffffe, 0xb35c) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000000c0)={0x5, 0x4, 0x16, 0x4, 0x2, 0x4, 0x3, 0x8f}) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, 0xffffffffffffffff, 0x0) fallocate(r4, 0x7, 0xfffffffffffffffb, 0x9) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000280)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @remote}, 0x10, {0x2, 0x4e23, @local}, 'erspan0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xd, 0x12, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x4000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) inotify_init1(0x81000) 19:12:53 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r3, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) readv(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000500)=""/218, 0xda}, {&(0x7f0000000a00)=""/236, 0xec}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/131, 0x83}], 0x6) 19:12:53 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:12:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x3000080, &(0x7f0000000180)=ANY=[]) lseek(r0, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000280), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r1 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f0000000040)=0x8, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) 19:12:53 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 579.952356] audit: type=1326 audit(1727032373.948:110): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 579.958628] audit: type=1326 audit(1727032373.948:111): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 579.960234] audit: type=1326 audit(1727032373.955:112): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 579.975118] audit: type=1326 audit(1727032373.955:113): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 579.987012] audit: type=1326 audit(1727032373.956:114): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 579.989400] Module has invalid ELF structures 19:12:53 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 579.999019] audit: type=1326 audit(1727032373.958:115): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 580.008038] audit: type=1326 audit(1727032373.958:116): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 580.019084] audit: type=1326 audit(1727032373.958:117): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 19:12:54 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {0x0}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 580.025626] audit: type=1326 audit(1727032373.960:118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5598 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb836a29b19 code=0x7ffc0000 [ 580.096344] Module has invalid ELF structures [ 594.777414] FAT-fs (loop3): invalid media value (0x7a) [ 594.778195] FAT-fs (loop3): Can't find a valid FAT filesystem [ 594.779720] kauditd_printk_skb: 53 callbacks suppressed [ 594.779732] audit: type=1326 audit(1727032388.775:172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5628 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:13:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETMODE(r0, 0x4b30, &(0x7f0000000080)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r1, 0x4b49, &(0x7f0000000000)) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000040)={0x3, 0x1f, 0x3}) 19:13:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x3000080, &(0x7f0000000180)=ANY=[]) lseek(r0, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000280), 0xb}, 0x1c210, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r1 = pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f0000000040)=0x8, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) 19:13:08 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x9, 0x0, 0x0) 19:13:08 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:08 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r3, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 19:13:08 executing program 3: r0 = gettid() process_vm_readv(r0, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0xb6, 0x6, 0xf9, 0x4, 0x0, 0x6, 0x23021, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa2a, 0x0, @perf_bp={&(0x7f0000000180)}, 0x5900, 0x1, 0x1, 0x1, 0x1, 0x8, 0xfff7, 0x0, 0x3, 0x0, 0x7fff}, r0, 0x5b0, 0xffffffffffffffff, 0x6) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xd, &(0x7f0000000200)=[{&(0x7f0000000040)="601c6d6b646f736677c66200088020000400000004f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736677c66200088020000400000004f80000200040000300000000000000010000000000000002000400010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x6}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10803}, {&(0x7f0000010600)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x11000}, {&(0x7f00000000c0)="f8ff337b4b13db9c33e5756f1c62c818000000ff0fffffff0fffffff8fffefff0fffffff0fffffff0ffaffff0f", 0x2d, 0x11800}, {&(0x7f0000010800)="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", 0x120, 0x11ffd}, {&(0x7f0000000780)="2e20202020202020202020100037e970325132510000e97032510300000000002e2e2020202020202020200f0037e970325132510000e970325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200037e970325132510000e970325104001a0400008c5bec7db2f27353545e09ecb19dc201857ef0c81179d7110a7485049984b972432bab401e05d181f5217ae8f70ffb0cf708da4b3a889d7bfcbb4830d581c663fda61c83da4a11a42028400beb279f4434529503a462f139658c34b1b659906b5401", 0xe2, 0x52000}, {&(0x7f0000000340)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x1}, {&(0x7f0000000140)="73797a472ba2b22501000000e49cc8ac8360c96b656c6c6572730000000000000000000000000b000000c720fe49db1ac6000000000000", 0x37, 0xd2000}, {&(0x7f0000011100)="73797a6b616c6c657273797a6b616c6c657273797a6b616c6c65727379eac7616c6c657273797a6b616c6c657273797a6b616c6c616c7a6b616c6c65d8fa2da36b616c6c65727300000000000000000000000000000000001000"/99, 0x63, 0x152000}], 0x0, &(0x7f0000011200)) 19:13:08 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {0x0}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:08 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 594.800244] Module has invalid ELF structures 19:13:08 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {0x0}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:08 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:08 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 19:13:08 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:08 executing program 3: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(r3, &(0x7f0000000380)="071e9f7358ec922343d9786f7c2147c81e6890a8016fb53a5ffc4951d0a6a9f38dda8a9bae8f6f3750405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7effe02c00c95f02860e708", 0x61) 19:13:08 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 594.898286] Module has invalid ELF structures [ 594.900659] Module has invalid ELF structures 19:13:08 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:08 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:08 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 595.012762] Module has invalid ELF structures [ 595.016531] Module has invalid ELF structures 19:13:09 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 595.107275] Module has invalid ELF structures [ 595.603074] audit: type=1326 audit(1727032389.598:173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5628 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:13:24 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:24 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1b, 0x0, 0x0) [ 610.143488] audit: type=1326 audit(1727032404.139:174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:13:24 executing program 2: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:13:24 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) fcntl$dupfd(r2, 0x0, r2) 19:13:24 executing program 0: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:24 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:24 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:24 executing program 3: pread64(0xffffffffffffffff, &(0x7f00000010c0)=""/4088, 0xff8, 0x0) listen(0xffffffffffffffff, 0x3) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="6c000000000901040000000000000000030000070900010073797a300000000008000340000000000800020006000340000400000c000280050001002f00000008000340000000060c0004800800017921c0c640000000080800054000000000000000000000000000001000"], 0x6c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffff9c, 0xc0506617, &(0x7f00000001c0)={@id={0x2, 0x0, @d}, 0x1, 0x0, '\x00', @auto=[0x36]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) openat(r1, &(0x7f0000000240)='./file0\x00', 0x4080, 0x30) faccessat2(r0, &(0x7f0000000280)='./file0\x00', 0x19, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x28, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x14, 0x11, 0x0, 0x1, [@generic="809801a7b0c7dba09475f251c743092f"]}]}, 0x28}}, 0x0) 19:13:24 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 610.219381] Module has invalid ELF structures [ 610.231215] Module has invalid ELF structures 19:13:24 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:24 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r0, &(0x7f0000003700)=[{&(0x7f00000014c0)=""/227, 0xe3}, {&(0x7f0000001800)=""/134, 0x86}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f0000001740)=""/155, 0x9b}, {&(0x7f0000001640)=""/256, 0x100}, {&(0x7f0000003640)=""/128, 0x80}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000440)=""/57, 0x39}], 0x8) readv(0xffffffffffffffff, &(0x7f0000000280), 0x0) lseek(r0, 0x27b, 0x2) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000000)={0x7, 0x8, 0x2, 0x2, 0x2, [0x9, 0x6, 0x2]}) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x40, 0x0, 0x7a, 0x0, 0x4, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x3fc0000000000, 0x0, 0x0, 0x4000000, 0x1000, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)="0f", 0xfce6, 0x4d42) fadvise64(r2, 0x1, 0x1, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init1(0x80000) inotify_add_watch(r3, &(0x7f0000000040)='.\x00', 0x2000003) r4 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer, 0x0) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) close(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000140)=""/82, 0x52}], 0x2) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 19:13:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180), 0x20000, 0x0) syz_io_uring_setup(0x2ccb, &(0x7f0000000080)={0x0, 0x4000000, 0x20, 0x1, 0x2, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x0, 0x0) r3 = dup3(r1, r0, 0x0) sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f00000001c0)="61a4c147", 0x5c8}], 0x1}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x45, &(0x7f0000000200)=""/139, &(0x7f0000000040)=0x8b) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r7, r6, 0x0, 0x9bbb) setsockopt$inet6_tcp_int(r7, 0x6, 0xc, &(0x7f0000000100)=0x3346, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f0000000100)={0x2, 0x0, 0x6, 0x3953, 0x81}, 0x14) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r4, 0x8000000) 19:13:24 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2, 0x2}, 0x1c) 19:13:24 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 610.354163] Module has invalid ELF structures [ 610.374655] audit: type=1400 audit(1727032404.370:175): avc: denied { watch_reads } for pid=5693 comm="syz-executor.0" path="/syzkaller-testdir695127733/syzkaller.erjJMS/59" dev="sda" ino=16017 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=dir permissive=1 [ 611.013603] audit: type=1326 audit(1727032405.006:176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5674 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:13:39 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) [ 625.258271] audit: type=1326 audit(1727032419.254:177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5716 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:13:39 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:39 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x63, 0x0, 0x0) 19:13:39 executing program 2: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:13:39 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:39 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='numa_maps\x00') readv(r0, &(0x7f0000003700)=[{&(0x7f00000014c0)=""/227, 0xe3}, {&(0x7f0000001800)=""/134, 0x86}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f0000001740)=""/155, 0x9b}, {&(0x7f0000001640)=""/256, 0x100}, {&(0x7f0000003640)=""/128, 0x80}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000440)=""/57, 0x39}], 0x8) readv(0xffffffffffffffff, &(0x7f0000000280), 0x0) lseek(r0, 0x27b, 0x2) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000000)={0x7, 0x8, 0x2, 0x2, 0x2, [0x9, 0x6, 0x2]}) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x40, 0x0, 0x7a, 0x0, 0x4, 0x0, 0x80000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x3fc0000000000, 0x0, 0x0, 0x4000000, 0x1000, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)="0f", 0xfce6, 0x4d42) fadvise64(r2, 0x1, 0x1, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) r3 = inotify_init1(0x80000) inotify_add_watch(r3, &(0x7f0000000040)='.\x00', 0x2000003) r4 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer, 0x0) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) close(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000140)=""/82, 0x52}], 0x2) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 19:13:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:39 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 625.341753] Module has invalid ELF structures 19:13:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:39 executing program 3: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:13:39 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 19:13:39 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:39 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:39 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:13:39 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 625.496773] Module has invalid ELF structures 19:13:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:39 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 625.612140] Module has invalid ELF structures [ 626.117786] audit: type=1326 audit(1727032420.109:178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5716 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:13:54 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x3f, 0x9, 0x80, 0x8, 0x0, 0x7, 0x1001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x20, 0x5, 0x4, 0x1, 0x0, 0x3, 0x3, 0x0, 0x3, 0x0, 0x5}, r1, 0x6, 0xffffffffffffffff, 0xa) [ 640.493543] audit: type=1326 audit(1727032434.489:179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5758 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 640.550744] Module has invalid ELF structures 19:13:54 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x69c, 0x0, 0x0) 19:13:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000080)) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xa8b02, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2000003, 0x1f012, r1, 0x0) lstat(&(0x7f0000000040)='./file1\x00', 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r2, 0x541b, 0x0) mmap(&(0x7f0000af0000/0x4000)=nil, 0x4000, 0x0, 0x1f012, r2, 0x0) 19:13:54 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:13:54 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:54 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:13:54 executing program 2: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:13:54 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 640.561401] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 640.562293] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 640.562903] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 640.563449] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 640.564177] print_req_error: 2 callbacks suppressed [ 640.564190] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 27 prio class 0 [ 640.565947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.566492] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.567482] buffer_io_error: 6 callbacks suppressed [ 640.567490] Buffer I/O error on dev sr0, logical block 0, async page read [ 640.568934] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.569439] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.570497] Buffer I/O error on dev sr0, logical block 1, async page read [ 640.571150] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.571684] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 5 prio class 0 [ 640.572567] Buffer I/O error on dev sr0, logical block 2, async page read [ 640.573246] Buffer I/O error on dev sr0, logical block 3, async page read [ 640.573892] Buffer I/O error on dev sr0, logical block 4, async page read [ 640.574531] Buffer I/O error on dev sr0, logical block 5, async page read [ 640.575135] Buffer I/O error on dev sr0, logical block 6, async page read [ 640.588145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.588897] blk_update_request: I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.589794] Buffer I/O error on dev sr0, logical block 7, async page read [ 640.590646] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.591352] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.592208] Buffer I/O error on dev sr0, logical block 0, async page read [ 640.593426] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.593925] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.594773] Buffer I/O error on dev sr0, logical block 1, async page read [ 640.595499] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.595991] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.596962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.597421] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.598425] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.598928] blk_update_request: I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 640.599907] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.602066] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.602612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.603321] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.603972] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.604704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.606444] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.607008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.607662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.608349] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.608988] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.610592] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.611270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.611801] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.612612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.613214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:13:54 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) [ 640.613887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.614516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.615417] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.616086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.617179] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.617738] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.618408] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.619020] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.619614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.620238] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.620888] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.621513] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.622196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.622743] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.623389] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.623995] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.624584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.625204] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.625782] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.626455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.627087] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.627622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.628242] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.628776] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.629413] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.630035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.630631] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.631277] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.631951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.632499] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.633134] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.633688] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.634389] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.634986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.635592] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.636234] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.636882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.637439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.638113] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.638674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.639287] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.639874] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.640464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.641119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.641694] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.642320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.643012] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.643549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.644214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.644745] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.645372] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.646047] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.646748] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.647362] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.647985] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.648541] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.649199] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.649733] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.650429] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.651077] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.651664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.652249] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.652879] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.653428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.654093] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.654647] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.655298] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.655946] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.656520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.657127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.657763] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.658798] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.659397] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.660069] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.660605] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.661285] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.661872] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.662492] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.663112] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.663950] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.664503] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.665173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.665708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.666991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.667579] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.668182] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.668770] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.669378] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.669968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.670522] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.671107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.671717] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.672335] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.673420] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.674038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.674624] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.675178] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.675762] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.676344] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.676998] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.677538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.678155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.678682] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.679271] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.679798] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.681501] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.682093] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.682725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.683294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.683898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.684462] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.685062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.685611] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.686240] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.686784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.688056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.688660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.689291] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.690441] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.694748] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.695368] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.695957] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.696539] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.697136] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.697716] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.698398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.699100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.699729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.700338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.700959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.701581] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.703186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.703796] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.704689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.705274] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.705854] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.706470] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.707787] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.708452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.709399] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.709975] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.710607] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.711155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.711763] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.712396] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.712966] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.713554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.714152] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.714730] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.715356] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.715911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.716535] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.717088] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.717721] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.718343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.719021] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.719587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.720284] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.720953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.721545] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.722133] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.722940] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.723056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.725961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726055] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726368] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.726900] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.727019] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.727105] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.727250] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.727344] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.727427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.727512] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.728422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.728513] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.737715] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.739108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.739682] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.740515] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.741107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.741708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.742385] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.743121] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.743689] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.744435] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.745029] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.745610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.746267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.746903] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.747480] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.748085] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.748672] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.749481] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.750075] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.750751] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.751699] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.752336] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.752986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.753605] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.754257] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.754881] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.755474] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.756052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.756644] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.757300] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:13:54 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={0x0}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 640.757912] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.758500] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.759362] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.759964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.760549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.761430] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.762522] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.764974] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.765575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.766314] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.766896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.767493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.768183] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.768765] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.769377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:13:54 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 640.770034] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.773997] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.774557] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.775209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.775797] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.776465] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.777057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.777655] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.778272] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.778996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.779525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.780120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.780660] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.781238] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.781781] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.782393] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.782953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.783562] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.784126] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.784693] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.785255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:13:54 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 640.785852] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.786407] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.787005] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.787530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.788167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.788934] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.789521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.790463] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.792123] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.792696] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.794774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.796012] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.796623] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.797304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.798041] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.798718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.799328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.800141] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.800729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.801444] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.802061] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.802720] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.803359] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.804009] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.804597] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.805262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.805797] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.806565] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.807134] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.807887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.808475] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.809096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.809674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.810381] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.810952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.811673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.812324] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.812961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.813548] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.814265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.814798] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.815587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.816604] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.818022] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.819478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.821062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.822495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.825051] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.826521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.827913] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.829354] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.830805] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.832223] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.834697] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.836086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.837495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.838960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.840434] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.841870] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.843374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.844748] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.846144] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.847549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.848971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.850382] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.851771] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.853142] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.855746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.857160] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.858664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.860050] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.861484] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.862878] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.864278] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.865648] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.867104] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.868505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.869880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.871307] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.872751] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.874130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.875578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.876973] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.878428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.879736] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.881078] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.882394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.883725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.885057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.886395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.887700] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.889092] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.890367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.891816] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.892567] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.893239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.893914] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.894550] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.895242] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.897413] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.898102] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.898786] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.899436] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.900056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.900685] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.901516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.902164] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.902793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.903586] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.904258] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.904939] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.905558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.906343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.907000] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.907646] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.908357] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.909054] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.909709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.910404] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.911057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.911672] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.912336] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.912986] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.913603] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.914290] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.915014] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.915652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.916376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.917027] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.917680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.918352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.919028] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.919670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.920417] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.921099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.921747] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.922444] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.923044] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.923575] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.924187] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.924739] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.925367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.926001] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.926544] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.927113] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.927636] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.928200] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.928731] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.929320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.929960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.930515] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.931131] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.931661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.932265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.932800] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.933497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.934132] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.934877] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.935495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.936134] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.936797] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.937439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.941954] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.942530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.943127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.943716] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.944325] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.944990] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.946972] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.947531] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.948142] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.948684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.949298] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.949932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.950493] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.951584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.952230] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.952769] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.953336] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.953898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.954447] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.955065] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.956136] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.956729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.957318] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.957959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.958490] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.959098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.959653] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.961041] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.961780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.962427] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.963021] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.963547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.964161] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.964696] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.965293] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.965964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.967058] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.967670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.968296] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.968860] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.970277] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.970431] Module has invalid ELF structures [ 640.970854] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.971695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.972346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.972952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.973490] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.974084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.975311] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.975935] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.976479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.977096] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.977722] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.978342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.978920] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.980128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.980667] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.981263] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.982114] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.982740] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.983612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.984201] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.984813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.985415] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.986092] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.986637] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.987297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.987885] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.988549] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.989153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.989752] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.990346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.991013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.991563] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.992188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.992740] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.993443] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.994064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.994676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.995279] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.995920] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.996467] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.997125] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.997670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.998892] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 640.999442] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.001208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.001751] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.002519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.003103] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.003719] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.004533] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.005221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.005767] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.006512] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.007100] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.007714] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.008319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.008956] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.009508] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.010267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.010823] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.011462] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.012073] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.012679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.013267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.013968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.014522] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.015211] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.015757] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.016406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.016993] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.017601] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.018246] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.018887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.019454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.020159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.020709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.021346] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.021998] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.022622] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.023203] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.023821] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.024517] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.025199] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.025746] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.026448] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.027033] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.027640] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.028306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.028946] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.029502] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.030255] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.030800] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.031437] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.032046] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.032658] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.033232] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.033897] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.034464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.035150] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.035696] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.036345] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.036929] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.037540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.038188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.038805] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.039390] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.040099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.040652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.041281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.041869] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.042502] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.043109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.043723] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.044303] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.045018] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.045566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.046243] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.046795] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.047474] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.048034] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.048678] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.049289] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.050027] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.050564] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.051192] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.051718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.052317] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.052860] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.053447] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.054022] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.054734] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.055342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.056002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.056589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.057242] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.057847] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.058454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.059046] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.059686] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.060273] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.060962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.061544] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.062222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.062826] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.063691] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.064305] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.065071] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.065675] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.066352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.067000] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.067650] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.068283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.069008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.069593] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.070323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.070971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.071620] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.072260] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.072992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.073875] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.074559] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.075225] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.075968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.076554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.077254] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.077881] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.078563] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.079242] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.079933] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.080543] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.081287] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.081918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.082595] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.083258] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.083944] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.084555] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.085263] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.085889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.086614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.087262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.087886] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.088441] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.089080] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.089656] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.090365] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.091441] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.092112] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.092765] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.093402] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.094086] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.094699] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.095410] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.096050] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.096719] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.097439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.098151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.098739] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.099428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.100038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.101181] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.101775] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.103547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.104214] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.105215] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.105883] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.106558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.107437] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.108101] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.108711] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.109439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.110111] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.110778] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.111431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.112130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.112720] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.113423] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.114050] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.114714] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.115434] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.116133] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.116744] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.117459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.118108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.118785] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.119452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.120128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.120788] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.121503] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.122140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.122878] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.123497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.124192] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.124780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.125482] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.126158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.126888] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.127584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.128282] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.128943] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.129621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.130268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.131063] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.131709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.132379] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.133038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.133709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.134340] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.135064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.135662] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.136333] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.137044] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.137712] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.138351] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.139074] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.139673] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.140352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.141028] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.141705] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.142376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.143085] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.143680] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.144353] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.145020] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.145684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.146340] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.147071] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.147710] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.148375] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.149038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.149704] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.150342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.151062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.151656] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.152337] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.153046] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.153713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.154348] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.155062] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.155652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.156313] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.156944] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.157625] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.158328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.158997] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.159606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.160328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.160972] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.161647] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.162307] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.162976] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.163638] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.164347] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.164991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.165674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.166356] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.167038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.167627] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.168330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.168996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.169669] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.170347] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.171196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.171960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.172577] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.173266] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.173915] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.174607] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.175417] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.176105] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.176731] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.177404] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.178090] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.178647] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.179352] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.180036] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.180612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.181239] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.181889] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.182476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.183125] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.183677] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.184318] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.184981] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.185582] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.186215] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.186801] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.187432] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.188053] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.188627] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.189297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.189976] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.190565] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.191159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.191752] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.192365] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.193014] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.193600] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.194259] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.194947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.195540] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.196156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.196754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.197364] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.197996] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.198577] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.199229] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.199926] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.200506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.201101] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.201677] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.202326] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.204369] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.205005] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.205600] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.206289] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.207087] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.207721] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.208373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.209001] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.209591] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.210231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.210866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.211519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.212144] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.212712] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.213339] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.214004] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.214593] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.215206] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.215799] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.216440] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.217059] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.217617] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.218238] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.218793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.219431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.220064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.220659] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.221328] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.222079] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.222641] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.223287] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.223871] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.224497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.225095] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.225694] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.226401] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.227041] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.227614] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.228250] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.228883] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.229499] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.230122] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.230723] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.231383] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.232019] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.232579] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.233230] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.233809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.234452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.235083] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.235668] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.236360] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.237002] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.237561] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.238234] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.238796] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.239467] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.240090] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.240679] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.241355] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.241983] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.242566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.243190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.243767] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.244430] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.245054] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.245653] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.246320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.246963] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.247539] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.248177] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.248757] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.249398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.250046] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.250612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.251327] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.251961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.252524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.253161] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.253716] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.254351] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.254960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.255545] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.256235] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.256817] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.257445] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.258101] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.258655] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.259302] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.259902] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.260585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.261260] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.261893] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.262581] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.263190] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.263791] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.264461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.265080] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.265713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.267198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.267959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.269274] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.269938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.271256] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.271896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.273197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.273779] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.274587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.276019] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.276695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.278268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.279661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.280458] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.281173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.282525] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.283246] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.284695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.285319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.286043] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.287402] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.288166] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.288816] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.289422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.290165] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.290710] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.291431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.292072] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.292695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.293283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.294016] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.294585] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.295338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.295961] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.296618] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.297250] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.297960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.298569] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.299251] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.299856] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.300572] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.301221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.301923] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.302505] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.303183] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.303753] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.304406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.305057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.307105] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.307656] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.308262] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.308856] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.309412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.310050] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.310593] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.311210] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.311809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.312561] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.313156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.313713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.314396] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.314983] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.315554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.316192] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.316800] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.317412] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.318035] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.318606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.319196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.319767] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.320393] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.321003] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.321627] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.322259] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.322867] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.323428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.324056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.324612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.325221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.325788] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.326486] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.327094] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.327639] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.328222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.328764] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.329376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.329972] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.330521] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.331153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.331709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.332333] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.332905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.333464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.334089] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.334650] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.335229] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.335905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.336510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.337167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.337748] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.339729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.340390] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.341043] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.341626] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.342348] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.343041] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.343590] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.344259] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.344894] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.345530] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.346142] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.346801] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.347784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.348449] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.349147] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.349759] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.350410] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.351143] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.351717] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.352372] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.353108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.353772] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.354447] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.355088] audit: type=1326 audit(1727032435.342:180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5758 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 641.358970] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.359537] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.361937] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.362495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.363138] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.363782] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.364456] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.365145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.365724] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.366367] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.367126] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.367718] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.368363] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.369099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.369702] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.370315] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.370927] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.371503] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.372103] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.372677] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.373344] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.373977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.374593] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.375286] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.375908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.376506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.379926] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.380516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.381175] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.381858] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.382468] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.383112] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.383699] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.384338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.384993] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.385572] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.386219] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.386828] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.387503] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.388107] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.388684] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.389334] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.389947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.390523] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.391176] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.391814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.392478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.393097] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.393683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.394342] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.394971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.395498] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.396422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.397120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.397728] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.398391] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.399014] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.400123] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.400707] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.401319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.402197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.403203] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.403908] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.404506] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.405240] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.406003] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.406587] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.407322] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.409006] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.425424] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.426466] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.427089] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.427686] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 641.428512] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.429556] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.445571] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.446596] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.447185] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.448243] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 641.449056] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.449777] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.464044] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.464929] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.465536] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.466155] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 06 00 00 02 00 [ 641.466957] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.481650] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.482621] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.483245] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.483851] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 06 00 00 02 00 [ 641.501058] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.501942] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.502519] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.503111] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 641.518338] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.519462] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.520130] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.520714] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 06 00 00 02 00 [ 641.566499] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.567495] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.568142] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.569222] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 641.603300] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.604137] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.604695] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.605258] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 06 00 00 02 00 [ 641.624038] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 641.626706] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 641.628219] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 641.629620] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 641.631919] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.632960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.633966] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.634476] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.638089] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.638725] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.639377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.640031] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.640658] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.641285] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.641899] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.642480] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.643097] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.643674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.644276] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.644872] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.645452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.646080] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.646766] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.647472] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.648252] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.648956] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.650098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.650738] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.651406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.652071] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.652720] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.653400] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.654150] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.654795] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.655467] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.656138] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.656779] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.657449] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.658127] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.658773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.659510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.660172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.660824] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.661489] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.662161] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.662815] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.663495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.664163] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.664942] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.665589] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.666270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.666953] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.667596] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.668265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.668940] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.669584] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.670330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.671221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.671855] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.672452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.673057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.673652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.674263] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.674879] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.675536] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.676143] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.676740] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.677343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.677968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.678543] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.680243] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.680864] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.682049] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.682743] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.683422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.684090] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.685156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.685810] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.686590] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.687299] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.688013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.688621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.689773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.690405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.691008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.691602] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.692203] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.692795] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.694006] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.694682] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.695395] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.696084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.696729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.697511] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.698246] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.698965] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.699664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.700478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.703422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.704507] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.705260] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.706000] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.706645] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.707518] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.708193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.708858] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.709574] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.710237] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.710903] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.711541] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.720454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.721218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.721871] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.722486] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.723295] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.724507] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.725621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.726424] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.727197] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.727774] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.728492] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 641.729265] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 19:14:11 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={0x0}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:11 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) gettid() 19:14:11 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={0x0}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:11 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:11 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x6a0, 0x0, 0x0) 19:14:11 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:14:11 executing program 2: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 657.138399] audit: type=1326 audit(1727032451.134:181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5798 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 657.167205] Module has invalid ELF structures [ 657.167308] Module has invalid ELF structures 19:14:11 executing program 3: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = gettid() process_vm_readv(r1, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7c}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xb7}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000000180)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) 19:14:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:11 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) 19:14:11 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={0x0}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:11 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 657.335309] Module has invalid ELF structures 19:14:11 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 19:14:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:11 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:11 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:11 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 657.470613] Module has invalid ELF structures 19:14:11 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 657.986392] audit: type=1326 audit(1727032451.982:182): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5798 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:14:26 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1500, 0x0, 0x0) 19:14:26 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:14:26 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0xa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) 19:14:26 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:26 executing program 3: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r0, 0x4b49, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x0) 19:14:26 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:26 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {0x0}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:26 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 672.226943] audit: type=1326 audit(1727032466.222:183): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5840 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 672.255157] Module has invalid ELF structures 19:14:26 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:26 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:14:26 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {0x0}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:26 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0xa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) 19:14:26 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000400)="b8bc88cb07d01427c823777f953790bf8059a3d40dd2ea94aefdba08694bd6b8fea6012105b16ed4976bdba945588329020480101ff0fcf7118f6f4de4bc6a3dce971a38163ae62ca650e8a54904b69a7e9673", 0x53}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x5, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:26 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 672.345236] Module has invalid ELF structures 19:14:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 672.397240] Module has invalid ELF structures [ 672.401337] Module has invalid ELF structures [ 672.446805] Module has invalid ELF structures [ 673.078417] audit: type=1326 audit(1727032467.070:184): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5840 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:14:41 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:14:41 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1600, 0x0, 0x0) 19:14:41 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:41 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {0x0}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:41 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:41 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:41 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:41 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0xa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) [ 687.830035] audit: type=1326 audit(1727032481.825:185): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5882 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:14:41 executing program 6: ioctl$F2FS_IOC_GET_PIN_FILE(0xffffffffffffffff, 0x8004f50e, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) [ 687.866412] Module has invalid ELF structures [ 687.871120] Module has invalid ELF structures [ 687.879479] Module has invalid ELF structures 19:14:41 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {0x0}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:41 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:41 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:14:41 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 687.932129] Module has invalid ELF structures 19:14:41 executing program 3: preadv2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file1\x00', 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x20080, 0x0) r2 = openat2(r0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={0x440200, 0x84}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)={0x114, 0x1d, 0x300, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0xfd, 0x11, 0x0, 0x1, [@generic="cabdd69942ae86268a922047d9b931f72731084d0549ba3c39c937995472e7f2c4854ccde899bf6e5e124c44777b29b0c0368c91fc2f36ad312f94d2f47690f0c18af62f53c4dcf3df8e075435d45ef1d2286d14eb74dc272eda069ed0643222101a57610aa97329fbf38aeb21dfafba4f9f7eaf2fee187358374fe1d2de0ba2e4c1538dd950a9535fa347d7fc5ef262742d21489e6596921275b4a695b2cae93696a18e7fb5b553883d7b4e819bdb4d64dc140405846c77ac7e53048e92848a8cee3f50520dab6d1b3fe0e39e058e4699c268df69d74d158d67afa56cc708696bbc16ea4f9fe70f3f0200"/249]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40}, 0x4) 19:14:41 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 19:14:41 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:14:41 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 688.036747] Module has invalid ELF structures [ 688.670374] audit: type=1326 audit(1727032482.660:186): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5882 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:15:02 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {0x0}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:02 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1700, 0x0, 0x0) 19:15:02 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:15:02 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:02 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @long}, 0x14) 19:15:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) listen(r3, 0x0) 19:15:02 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:15:02 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 708.307325] audit: type=1326 audit(1727032502.303:187): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5930 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 708.315095] Module has invalid ELF structures 19:15:02 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:15:02 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {0x0}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:02 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:15:02 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:15:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) listen(r3, 0x0) 19:15:02 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 708.420588] Module has invalid ELF structures 19:15:02 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 708.452233] Module has invalid ELF structures 19:15:02 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_delete(0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r1) r2 = signalfd(r0, &(0x7f0000000100)={[0x2]}, 0x8) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x9, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x2, 0x100}, 0x0, 0x3598b8b3, 0x9, 0x0, 0x0, 0x4, 0x1, 0x0, 0x55c, 0x0, 0x9}, r1, 0x2, r2, 0x8) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @tid=r3}, &(0x7f0000000340)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') pread64(r4, &(0x7f0000000580)=""/168, 0xffffffffffffff2c, 0x4) read(r4, &(0x7f00000002c0)=""/122, 0x7a) timer_create(0x0, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) timer_gettime(r5, &(0x7f0000000080)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 709.143258] audit: type=1326 audit(1727032503.139:188): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5930 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:15:17 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:15:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) listen(r3, 0x0) 19:15:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1800, 0x0, 0x0) 19:15:17 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:15:17 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:17 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:17 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_delete(0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r1) r2 = signalfd(r0, &(0x7f0000000100)={[0x2]}, 0x8) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x9, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x2, 0x100}, 0x0, 0x3598b8b3, 0x9, 0x0, 0x0, 0x4, 0x1, 0x0, 0x55c, 0x0, 0x9}, r1, 0x2, r2, 0x8) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @tid=r3}, &(0x7f0000000340)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') pread64(r4, &(0x7f0000000580)=""/168, 0xffffffffffffff2c, 0x4) read(r4, &(0x7f00000002c0)=""/122, 0x7a) timer_create(0x0, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) timer_gettime(r5, &(0x7f0000000080)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:15:17 executing program 6: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:15:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) listen(r3, 0x0) 19:15:17 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 723.260580] audit: type=1326 audit(1727032517.254:189): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5971 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 723.306178] Module has invalid ELF structures 19:15:17 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:17 executing program 6: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x66516, 0x0, 0x0) 19:15:17 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)='k', 0x1}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:17 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_delete(0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000009c0)={0x0, 0x0}) setpgid(0x0, r1) r2 = signalfd(r0, &(0x7f0000000100)={[0x2]}, 0x8) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x9, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x2, 0x100}, 0x0, 0x3598b8b3, 0x9, 0x0, 0x0, 0x4, 0x1, 0x0, 0x55c, 0x0, 0x9}, r1, 0x2, r2, 0x8) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x1, @tid=r3}, &(0x7f0000000340)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/protocols\x00') pread64(r4, &(0x7f0000000580)=""/168, 0xffffffffffffff2c, 0x4) read(r4, &(0x7f00000002c0)=""/122, 0x7a) timer_create(0x0, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) timer_gettime(r5, &(0x7f0000000080)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 723.413216] audit: type=1326 audit(1727032517.409:190): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5999 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:15:17 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 723.529785] Module has invalid ELF structures [ 724.271357] audit: type=1326 audit(1727032518.267:191): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5999 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:15:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) 19:15:32 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, 0x0) 19:15:32 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:15:32 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)='k', 0x1}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:32 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:32 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) (fail_nth: 1) 19:15:32 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:15:32 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000540)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xe, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x800}, 0x1, 0x4, 0x1002, 0x5, 0x7, 0x0, 0xd395}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0xa040, @dev={0xac, 0x14, 0x14, 0x3}}, {0x2, 0x0, @loopback}, {0x2, 0x4e23, @empty}, 0x155, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) creat(&(0x7f0000000240)='./file0\x00', 0x17c) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xffff, 0xc244, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x2, 0x6}, 0x0, 0x0, 0xfffffffd, 0x2, 0x2000000, 0x2, 0xffff, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000300)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) r2 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) open_by_handle_at(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000002000000080000000100000000e608010000000000c43414c3000000"], 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="00001b0000ce7c00cd97d723f5bd14b2e26fa8d73c088ad730a97b3d0484694d2a4f7f8945ae9a68b3164d8b5f5732ad59413513f8c51ab684c8beef10817a8a57bfa1f641e5af396f4e2ca45aff190445d871fb52abcb68036e9988c17503aa85a68b5e35e7a09934208d28305ed2fcca68b61e9c1c98fd525244f8e4b4", @ANYRESOCT=r2, @ANYBLOB="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"], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20004080) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0xfffffffffffffffe, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r3, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) [ 738.403794] FAULT_INJECTION: forcing a failure. [ 738.403794] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 738.405167] CPU: 0 PID: 6019 Comm: syz-executor.6 Not tainted 5.10.226 #1 [ 738.405784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 738.406537] Call Trace: [ 738.406799] dump_stack+0x107/0x167 [ 738.407173] should_fail.cold+0x5/0xa [ 738.407562] _copy_to_user+0x2e/0x180 [ 738.407933] simple_read_from_buffer+0xcc/0x160 [ 738.408374] proc_fail_nth_read+0x198/0x230 [ 738.408782] ? proc_sessionid_read+0x230/0x230 [ 738.409214] ? security_file_permission+0xb1/0xe0 [ 738.409656] ? proc_sessionid_read+0x230/0x230 [ 738.410078] vfs_read+0x228/0x620 [ 738.410413] ksys_read+0x12d/0x260 [ 738.410749] ? vfs_write+0xb10/0xb10 [ 738.411135] do_syscall_64+0x33/0x40 [ 738.411508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 738.411985] RIP: 0033:0x7f7561f2069c [ 738.412337] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 738.413980] RSP: 002b:00007f755f4e3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 738.414680] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7561f2069c [ 738.415363] RDX: 000000000000000f RSI: 00007f755f4e31e0 RDI: 0000000000000004 [ 738.416011] RBP: 00007f755f4e31d0 R08: 0000000000000000 R09: 0000000000000000 [ 738.416664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 738.417317] R13: 00007fffe87dee0f R14: 00007f755f4e3300 R15: 0000000000022000 [ 738.467346] Module has invalid ELF structures [ 738.468875] audit: type=1326 audit(1727032532.464:192): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6030 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:15:32 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)='k', 0x1}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:32 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:32 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 19:15:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) 19:15:32 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 738.669764] Module has invalid ELF structures 19:15:32 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 738.751190] Module has invalid ELF structures [ 739.322073] audit: type=1326 audit(1727032533.312:193): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6030 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:15:47 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245", 0x6}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000715000, 0x0, 0x0) 19:15:47 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:15:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x2, 0x0) 19:15:47 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:47 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:15:47 executing program 3: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:15:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x500000001) [ 753.407552] audit: type=1326 audit(1727032547.402:194): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6053 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:15:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b2f, 0x0) 19:15:47 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245", 0x6}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 753.464226] Module has invalid ELF structures 19:15:47 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:47 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:15:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000717000, 0x0, 0x0) 19:15:47 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245", 0x6}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:15:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b30, 0x0) 19:15:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) [ 753.617598] audit: type=1326 audit(1727032547.613:195): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6079 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 753.649212] Module has invalid ELF structures [ 754.491664] audit: type=1326 audit(1727032548.488:196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6079 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:16:02 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:02 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000719000, 0x0, 0x0) 19:16:02 executing program 3: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:16:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) 19:16:02 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c402", 0x8}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b31, 0x0) [ 768.509515] audit: type=1326 audit(1727032562.504:197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6098 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:16:02 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:02 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:16:02 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c402", 0x8}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b32, 0x0) [ 768.582692] Module has invalid ELF structures 19:16:02 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b33, 0x0) 19:16:02 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:02 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c402", 0x8}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 768.701758] Module has invalid ELF structures 19:16:02 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b34, 0x0) [ 768.815334] Module has invalid ELF structures [ 769.349340] audit: type=1326 audit(1727032563.336:198): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6098 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:16:17 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:17 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000071b000, 0x0, 0x0) 19:16:17 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025c", 0x9}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:17 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b35, 0x0) 19:16:17 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:16:17 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x0, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:17 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 783.287207] Module has invalid ELF structures [ 783.360270] audit: type=1326 audit(1727032577.356:199): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6135 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:16:17 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:17 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x0, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:17 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025c", 0x9}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:17 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:16:17 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b36, 0x0) [ 783.480753] Module has invalid ELF structures 19:16:17 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 783.497537] Module has invalid ELF structures 19:16:17 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025c", 0x9}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 783.551160] Module has invalid ELF structures [ 784.143991] audit: type=1326 audit(1727032578.139:200): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6135 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:16:31 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000071d000, 0x0, 0x0) 19:16:31 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:16:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) ioprio_get$pid(0x0, 0x0) [ 798.013852] audit: type=1326 audit(1727032592.008:201): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6184 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:16:32 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x0, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:32 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:32 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b37, 0x0) 19:16:32 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:32 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) finit_module(r1, 0x0, 0x0) [ 798.050071] Module has invalid ELF structures 19:16:32 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:32 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) finit_module(r1, 0x0, 0x0) [ 798.106091] Module has invalid ELF structures 19:16:32 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3a, 0x0) 19:16:32 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:32 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:32 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3b, 0x0) 19:16:32 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 798.171307] Module has invalid ELF structures [ 798.229051] Module has invalid ELF structures [ 798.868296] audit: type=1326 audit(1727032592.860:202): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6184 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:16:47 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) finit_module(r1, 0x0, 0x0) 19:16:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000071f000, 0x0, 0x0) 19:16:47 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 813.596646] audit: type=1326 audit(1727032607.592:203): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6227 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 813.606085] Module has invalid ELF structures [ 813.617123] Module has invalid ELF structures 19:16:47 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000e2ece93897edad249009f03ee8cb0000800000b99bda00c712141394189ab876c5ec51847ae8ca3bdca220584ea8b7fba798b7c6afaecf4d2da11bb43b33e3c2732bb69278b5551fac836a47b7d1", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\a\x00\x00\x00I/filM0\x00']) 19:16:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3c, 0x0) [ 813.688662] Module has invalid ELF structures [ 813.712689] Module has invalid ELF structures 19:16:47 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {0x0}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:47 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:47 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:47 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:47 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {0x0}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:47 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:47 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:16:47 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:16:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3d, 0x0) 19:16:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) [ 813.824139] Module has invalid ELF structures [ 813.865125] Module has invalid ELF structures [ 814.448266] audit: type=1326 audit(1727032608.441:204): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6227 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:17:02 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {0x0}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b40, 0x0) 19:17:02 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000721000, 0x0, 0x0) 19:17:02 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:17:02 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) lseek(r1, 0x0, 0x3) 19:17:02 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:02 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 828.932296] Module has invalid ELF structures 19:17:02 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:02 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b41, 0x0) [ 828.945729] Module has invalid ELF structures [ 828.952709] audit: type=1326 audit(1727032622.948:205): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6272 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:17:02 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:02 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:17:03 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:03 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 829.062157] Module has invalid ELF structures 19:17:03 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000725000, 0x0, 0x0) 19:17:03 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:17:03 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b44, 0x0) [ 829.135184] Module has invalid ELF structures [ 829.156930] audit: type=1326 audit(1727032623.152:206): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6304 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 829.205605] Module has invalid ELF structures [ 830.041013] audit: type=1326 audit(1727032624.001:207): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6304 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:17:18 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:18 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:18 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000073d000, 0x0, 0x0) 19:17:18 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:17:18 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:18 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b45, 0x0) 19:17:18 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:17:18 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x412a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1006, 0x4, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) [ 844.391500] audit: type=1326 audit(1727032638.387:208): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6326 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 844.416443] Module has invalid ELF structures 19:17:18 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 844.459152] Module has invalid ELF structures 19:17:18 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f5", 0x75}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:18 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:18 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {0x0}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:18 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b46, 0x0) 19:17:18 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:18 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b47, 0x0) [ 844.573598] Module has invalid ELF structures [ 845.239036] audit: type=1326 audit(1727032639.235:209): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6326 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 859.224637] audit: type=1326 audit(1727032653.220:210): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6354 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:17:33 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f5", 0x75}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:33 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000073f000, 0x0, 0x0) 19:17:33 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:17:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000040)={0xa, 0xfc, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}, 0x1c) 19:17:33 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:33 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {0x0}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:33 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b48, 0x0) [ 859.275249] Module has invalid ELF structures 19:17:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 19:17:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b49, 0x0) 19:17:33 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {0x0}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:33 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f5", 0x75}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:33 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, 0x0, 0x0) 19:17:33 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:17:33 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4a, 0x0) 19:17:33 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7", 0xaf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 859.444116] Module has invalid ELF structures [ 860.080837] audit: type=1326 audit(1727032654.073:211): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6354 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:17:47 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000741000, 0x0, 0x0) 19:17:47 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:17:47 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, 0x0, 0x0) 19:17:47 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:47 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4b, 0x0) 19:17:47 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:17:47 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7", 0xaf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 874.022611] audit: type=1326 audit(1727032668.018:212): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6402 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 874.058464] Module has invalid ELF structures 19:17:48 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4c, 0x0) 19:17:48 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7", 0xaf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:48 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:17:48 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, 0x0, 0x0) 19:17:48 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:17:48 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:17:48 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4d, 0x0) [ 874.238599] Module has invalid ELF structures [ 874.313121] Module has invalid ELF structures [ 874.871003] audit: type=1326 audit(1727032668.860:213): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6402 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:18:03 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a658234174", 0xcc}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:03 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000743000, 0x0, 0x0) 19:18:03 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:18:03 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:03 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:18:03 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4e, 0x0) 19:18:03 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 889.983457] Module has invalid ELF structures [ 889.994633] Module has invalid ELF structures [ 889.996184] audit: type=1326 audit(1727032683.992:214): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6441 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:18:03 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:04 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:04 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a658234174", 0xcc}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:04 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:04 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b52, 0x0) [ 890.080246] Module has invalid ELF structures [ 890.097524] Module has invalid ELF structures 19:18:04 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:04 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:18:04 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b62, 0x0) [ 890.195059] Module has invalid ELF structures [ 890.833254] audit: type=1326 audit(1727032684.818:215): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6441 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 902.381451] kworker/dying (64) used greatest stack depth: 23024 bytes left 19:18:19 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:19 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000745000, 0x0, 0x0) 19:18:19 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:18:19 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:18:19 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a658234174", 0xcc}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:19 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:19 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:19 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b63, 0x0) [ 905.355146] audit: type=1326 audit(1727032699.349:216): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6489 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 905.365577] Module has invalid ELF structures 19:18:19 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 905.386661] Module has invalid ELF structures 19:18:19 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:19 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60", 0xdb}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:19 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:19 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:18:19 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b64, 0x0) [ 905.456553] Module has invalid ELF structures [ 905.476559] Module has invalid ELF structures 19:18:19 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 905.565175] Module has invalid ELF structures [ 906.213424] audit: type=1326 audit(1727032700.192:217): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6489 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 920.589705] Module has invalid ELF structures 19:18:34 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:34 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000747000, 0x0, 0x0) 19:18:34 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:18:34 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:34 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b65, 0x0) 19:18:34 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:18:34 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60", 0xdb}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:34 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 920.606037] audit: type=1326 audit(1727032714.602:218): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6525 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:18:34 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:34 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b66, 0x0) [ 920.643424] Module has invalid ELF structures 19:18:34 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:18:34 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60", 0xdb}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:34 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:34 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 920.722273] Module has invalid ELF structures 19:18:34 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(0x0, 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:34 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b67, 0x0) [ 920.762115] Module has invalid ELF structures [ 921.428667] audit: type=1326 audit(1727032715.424:219): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6525 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:18:49 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000749000, 0x0, 0x0) 19:18:49 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:18:49 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:49 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a015", 0xe2}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:49 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:49 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b68, 0x0) 19:18:49 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(0x0, 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:49 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 935.912982] audit: type=1326 audit(1727032729.909:220): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 935.934244] Module has invalid ELF structures 19:18:49 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(0x0, 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:49 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:49 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b69, 0x0) 19:18:49 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a015", 0xe2}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:18:49 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:18:49 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) [ 936.060448] Module has invalid ELF structures [ 936.754021] audit: type=1326 audit(1727032730.750:221): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6566 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 951.471162] audit: type=1326 audit(1727032745.467:222): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6601 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:19:05 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b6a, 0x0) 19:19:05 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000074b000, 0x0, 0x0) 19:19:05 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:19:05 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:05 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:05 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:05 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a015", 0xe2}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:05 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 951.487586] Module has invalid ELF structures 19:19:05 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e", 0xe6}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:05 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:05 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b70, 0x0) 19:19:05 executing program 2: socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:05 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:19:05 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:05 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 951.598356] Module has invalid ELF structures 19:19:05 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e", 0xe6}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 952.373457] audit: type=1326 audit(1727032746.346:223): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6601 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 967.078640] Module has invalid ELF structures 19:19:21 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000074d000, 0x0, 0x0) 19:19:21 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup(0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:19:21 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:19:21 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:21 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b71, 0x0) 19:19:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:21 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e", 0xe6}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:21 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 967.116738] audit: type=1326 audit(1727032761.112:224): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6646 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:19:21 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:19:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:21 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:21 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:21 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e8648", 0xe8}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:21 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b72, 0x0) [ 967.202004] Module has invalid ELF structures 19:19:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 967.318137] Module has invalid ELF structures [ 967.982609] audit: type=1326 audit(1727032761.979:225): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6646 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 982.351988] audit: type=1326 audit(1727032776.347:226): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6695 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:19:36 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e8648", 0xe8}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:36 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:36 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4bfa, 0x0) 19:19:36 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:36 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup(0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:19:36 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000074f000, 0x0, 0x0) [ 982.367547] Module has invalid ELF structures 19:19:36 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:36 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4bfb, 0x0) 19:19:36 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e8648", 0xe8}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 982.463573] Module has invalid ELF structures 19:19:36 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:36 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:36 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:36 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:36 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5409, 0x0) 19:19:36 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 982.638335] Module has invalid ELF structures [ 983.193975] audit: type=1326 audit(1727032777.189:227): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6695 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:19:51 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:51 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000751000, 0x0, 0x0) 19:19:51 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = dup(0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:19:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:51 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 997.916057] audit: type=1326 audit(1727032791.912:228): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6735 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 997.918892] Module has invalid ELF structures 19:19:51 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {0x0}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:51 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540b, 0x0) 19:19:51 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:51 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:51 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:51 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:19:51 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {0x0}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:19:51 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540c, 0x0) [ 997.996782] Module has invalid ELF structures 19:19:51 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:19:52 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 998.202859] Module has invalid ELF structures [ 998.730743] audit: type=1326 audit(1727032792.726:229): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6735 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:20:07 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000753000, 0x0, 0x0) 19:20:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:20:07 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:20:07 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {0x0}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:07 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540d, 0x0) 19:20:07 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {0x0}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:07 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:07 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1013.828761] audit: type=1326 audit(1727032807.824:230): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6776 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:20:07 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:20:07 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540e, 0x0) 19:20:07 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {0x0}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, 0x0, 0x0) 19:20:07 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1013.987251] Module has invalid ELF structures [ 1014.675662] audit: type=1326 audit(1727032808.666:231): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6776 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:20:24 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000755000, 0x0, 0x0) 19:20:24 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {0x0}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:24 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:20:24 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540f, 0x0) 19:20:24 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:24 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:24 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, 0x0, 0x0) 19:20:24 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1030.472399] audit: type=1326 audit(1727032824.468:232): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6826 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1030.477780] Module has invalid ELF structures 19:20:24 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5410, 0x0) 19:20:24 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, 0x0, 0x0) 19:20:24 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:24 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:24 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1030.649238] Module has invalid ELF structures 19:20:24 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5411, 0x0) [ 1031.303563] audit: type=1326 audit(1727032825.299:233): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6826 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:20:39 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:39 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000757000, 0x0, 0x0) 19:20:39 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5412, 0x0) 19:20:39 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:39 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:20:39 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:20:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) [ 1045.834481] Module has invalid ELF structures 19:20:39 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1045.856199] audit: type=1326 audit(1727032839.852:234): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6865 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1045.878063] Module has invalid ELF structures 19:20:39 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:39 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:39 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5413, 0x0) 19:20:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) [ 1045.954665] Module has invalid ELF structures 19:20:39 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:20:39 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:40 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6e", 0x70}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:40 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1046.045577] Module has invalid ELF structures [ 1046.082243] perf: interrupt took too long (35361 > 10138), lowering kernel.perf_event_max_sample_rate to 5000 [ 1046.127528] Module has invalid ELF structures [ 1046.665091] audit: type=1326 audit(1727032840.660:235): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6865 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:20:55 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:55 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:20:55 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6e", 0x70}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) 19:20:55 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000759000, 0x0, 0x0) 19:20:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5414, 0x0) 19:20:55 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:20:55 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1061.122051] Module has invalid ELF structures [ 1061.124836] Module has invalid ELF structures [ 1061.126881] audit: type=1326 audit(1727032855.122:236): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6906 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:20:55 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:55 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:55 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1}, 0x1c) 19:20:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5415, 0x0) 19:20:55 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6e", 0x70}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:20:55 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1061.241647] Module has invalid ELF structures [ 1061.243831] Module has invalid ELF structures 19:20:55 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:55 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:20:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5416, 0x0) [ 1061.331776] Module has invalid ELF structures [ 1061.355271] Module has invalid ELF structures [ 1061.940059] audit: type=1326 audit(1727032855.924:237): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6906 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:21:11 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000075b000, 0x0, 0x0) 19:21:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b7", 0xa8}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1077.166784] Module has invalid ELF structures [ 1077.168188] audit: type=1326 audit(1727032871.163:238): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6946 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:21:11 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:21:11 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1}, 0x1c) 19:21:11 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:11 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5418, 0x0) [ 1077.253518] Module has invalid ELF structures 19:21:11 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:11 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:11 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000640)={0xa, 0xfc, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1}, 0x1c) 19:21:11 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:11 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541b, 0x0) 19:21:11 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:11 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b7", 0xa8}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1077.361923] Module has invalid ELF structures [ 1077.377953] Module has invalid ELF structures [ 1078.011585] audit: type=1326 audit(1727032871.999:239): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6946 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1092.838969] audit: type=1326 audit(1727032886.834:240): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6984 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:21:26 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000075d000, 0x0, 0x0) 19:21:26 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541c, 0x0) 19:21:26 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b7", 0xa8}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:26 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:21:26 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:26 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:26 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:26 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541d, 0x0) [ 1092.882211] Module has invalid ELF structures 19:21:26 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1092.950828] Module has invalid ELF structures 19:21:26 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:26 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:27 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1093.021920] Module has invalid ELF structures 19:21:27 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:27 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541e, 0x0) 19:21:27 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1093.063817] Module has invalid ELF structures [ 1093.250332] Module has invalid ELF structures [ 1093.670045] audit: type=1326 audit(1727032887.666:241): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=6984 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1108.272393] audit: type=1326 audit(1727032902.268:242): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7030 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:21:42 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:42 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000075f000, 0x0, 0x0) 19:21:42 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:42 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e8143", 0xc4}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:42 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(0x0, 0x0) finit_module(r1, 0x0, 0x0) 19:21:42 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541e, 0x0) 19:21:42 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b7", 0xa8}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:42 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:21:42 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e8143", 0xc4}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:42 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5421, 0x0) 19:21:42 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1108.393866] Module has invalid ELF structures [ 1108.397120] Module has invalid ELF structures 19:21:42 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(0x0, 0x0) finit_module(r1, 0x0, 0x0) 19:21:42 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e8143", 0xc4}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:42 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1108.515484] Module has invalid ELF structures 19:21:42 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5422, 0x0) 19:21:42 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:42 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x2, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1108.592758] Module has invalid ELF structures [ 1108.698312] Module has invalid ELF structures [ 1109.127860] audit: type=1326 audit(1727032903.120:243): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7030 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1123.643801] audit: type=1326 audit(1727032917.639:244): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7074 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1123.682636] Module has invalid ELF structures 19:21:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000075f000, 0x0, 0x0) 19:21:57 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000761000, 0x0, 0x0) 19:21:57 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb3", 0xd2}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:57 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:21:57 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(0x0, 0x0) finit_module(r1, 0x0, 0x0) 19:21:57 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5423, 0x0) 19:21:57 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:57 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1123.703942] audit: type=1326 audit(1727032917.700:245): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7075 comm="syz-executor.2" exe="/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6e2e896b19 code=0x0 19:21:57 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:57 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5424, 0x0) 19:21:57 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb3", 0xd2}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1123.753029] Module has invalid ELF structures 19:21:57 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1123.782912] Module has invalid ELF structures 19:21:57 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:21:57 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5425, 0x0) [ 1123.829116] Module has invalid ELF structures 19:21:57 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:21:57 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb3", 0xd2}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1123.919300] Module has invalid ELF structures [ 1124.486053] audit: type=1326 audit(1727032918.482:246): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7074 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:22:13 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:13 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000763000, 0x0, 0x0) [ 1139.775829] audit: type=1326 audit(1727032933.768:247): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7115 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1139.818460] Module has invalid ELF structures 19:22:13 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:13 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:13 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5427, 0x0) 19:22:13 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:13 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906", 0xd9}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:13 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 1139.867604] Module has invalid ELF structures 19:22:13 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:13 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906", 0xd9}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:13 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5428, 0x0) 19:22:13 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:13 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:13 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1139.982247] Module has invalid ELF structures 19:22:14 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0), 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:14 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:14 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5429, 0x0) [ 1140.033217] Module has invalid ELF structures [ 1140.107571] Module has invalid ELF structures [ 1140.611754] audit: type=1326 audit(1727032934.607:248): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7115 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:22:29 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:29 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 1155.331175] audit: type=1326 audit(1727032949.327:249): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7161 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1155.346415] Module has invalid ELF structures 19:22:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000765000, 0x0, 0x0) 19:22:29 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:29 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906", 0xd9}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:29 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, 0x0, 0x0) 19:22:29 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:29 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5437, 0x0) 19:22:29 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:29 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebe", 0xdc}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1155.413042] cgroup: fork rejected by pids controller in /syz1 19:22:29 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:29 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5441, 0x0) 19:22:29 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1155.494045] Module has invalid ELF structures 19:22:29 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, 0x0, 0x0) 19:22:29 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebe", 0xdc}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:29 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1155.653121] Module has invalid ELF structures [ 1156.180370] audit: type=1326 audit(1727032950.176:250): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7161 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:22:44 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000076d000, 0x0, 0x0) 19:22:44 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:22:44 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:44 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:44 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, 0x0, 0x0) 19:22:44 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={0x0}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:44 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebe", 0xdc}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5450, 0x0) 19:22:44 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:44 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:22:44 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1170.754496] audit: type=1326 audit(1727032964.750:251): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7201 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:22:44 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e2", 0xde}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:22:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5451, 0x0) [ 1170.846932] Module has invalid ELF structures 19:22:44 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:00 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e2", 0xde}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:00 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 1186.747755] audit: type=1326 audit(1727032980.738:252): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7243 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:23:00 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5452, 0x0) 19:23:00 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000771000, 0x0, 0x0) 19:23:00 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:00 executing program 1: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:23:00 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={0x0}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:00 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1186.863092] Module has invalid ELF structures 19:23:00 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x545d, 0x0) 19:23:00 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e2", 0xde}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:00 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:00 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={0x0}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:00 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:00 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:00 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5460, 0x0) 19:23:00 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:01 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1187.079132] Module has invalid ELF structures [ 1187.600603] audit: type=1326 audit(1727032981.591:253): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7243 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:23:15 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:15 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000775000, 0x0, 0x0) 19:23:15 executing program 1: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78, r4}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r4}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:23:15 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5600, 0x0) [ 1201.969308] audit: type=1326 audit(1727032995.965:254): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7283 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:23:15 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:15 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:15 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:23:16 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5601, 0x0) 19:23:16 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:16 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:16 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x3, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1202.102627] Module has invalid ELF structures 19:23:16 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:16 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:16 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5602, 0x0) 19:23:16 executing program 2: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:16 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1202.254891] Module has invalid ELF structures [ 1202.822709] audit: type=1326 audit(1727032996.818:255): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7283 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:23:31 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:31 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000779000, 0x0, 0x0) 19:23:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5600, 0x0) 19:23:31 executing program 2: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:31 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:31 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5603, 0x0) 19:23:31 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:31 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 1217.829509] audit: type=1326 audit(1727033011.825:256): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7330 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1217.833508] Module has invalid ELF structures 19:23:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5600, 0x0) 19:23:31 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:31 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(0x0, 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:31 executing program 2: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:31 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5605, 0x0) 19:23:31 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:31 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(0x0, 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:31 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5600, 0x0) 19:23:31 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1218.644287] audit: type=1326 audit(1727033012.639:257): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7330 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:23:48 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:48 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000077d000, 0x0, 0x0) [ 1234.775997] audit: type=1326 audit(1727033028.772:258): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7367 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:23:48 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5606, 0x0) 19:23:48 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(0x0, 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:48 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x5600, 0x0) 19:23:48 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:48 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:48 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:23:48 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:48 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x5600, 0x0) 19:23:48 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5607, 0x0) 19:23:48 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:48 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:48 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:48 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:23:48 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:23:48 executing program 1: ioctl$TCXONC(0xffffffffffffffff, 0x5600, 0x0) [ 1235.625068] audit: type=1326 audit(1727033029.621:259): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7367 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:04 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5608, 0x0) 19:24:04 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000781000, 0x0, 0x0) 19:24:04 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) syz_open_dev$tty1(0xc, 0x4, 0x1) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:24:04 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:04 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x5600, 0x0) 19:24:04 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:04 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:24:04 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1250.220141] audit: type=1326 audit(1727033044.216:260): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7420 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:04 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:04 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x5600, 0x0) 19:24:04 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:04 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:04 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1251.069319] audit: type=1326 audit(1727033045.058:261): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7420 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:19 executing program 1: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x5600, 0x0) 19:24:19 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000783000, 0x0, 0x0) 19:24:19 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) syz_open_dev$tty1(0xc, 0x4, 0x1) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:24:19 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:24:19 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5609, 0x0) 19:24:20 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{0x0}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1266.038086] audit: type=1326 audit(1727033060.033:262): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7446 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:20 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:24:20 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="86", 0x1}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560a, 0x0) 19:24:20 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="86", 0x1}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:20 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560b, 0x0) [ 1266.857092] audit: type=1326 audit(1727033060.850:263): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7446 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:35 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000785000, 0x0, 0x0) [ 1281.576167] audit: type=1326 audit(1727033075.572:264): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7490 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:35 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) syz_open_dev$tty1(0xc, 0x4, 0x1) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:24:35 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="86", 0x1}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:24:35 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560c, 0x0) 19:24:35 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c", 0x26}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560d, 0x0) 19:24:35 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:35 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c", 0x26}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1282.425121] audit: type=1326 audit(1727033076.421:265): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7490 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:51 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560e, 0x0) 19:24:51 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000787000, 0x0, 0x0) 19:24:51 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:24:51 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c", 0x26}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:24:51 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560f, 0x0) 19:24:51 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe6", 0x38}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1297.854932] audit: type=1326 audit(1727033091.851:266): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7524 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:24:51 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40049409, 0x0) 19:24:51 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:24:51 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000789000, 0x0, 0x0) [ 1297.998822] audit: type=1326 audit(1727033091.994:267): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7558 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1298.853142] audit: type=1326 audit(1727033092.849:268): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7558 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:25:07 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a015", 0xe2}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc9000078b000, 0x0, 0x0) 19:25:07 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:25:07 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:07 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe6", 0x38}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40086602, 0x0) 19:25:07 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1313.639183] audit: type=1326 audit(1727033107.635:269): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7575 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:25:07 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be87", 0xf}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe6", 0x38}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40087602, 0x0) 19:25:07 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:07 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d", 0x41}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:07 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:07 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1313.841257] Module has invalid ELF structures [ 1314.478082] audit: type=1326 audit(1727033108.474:270): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7575 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:25:28 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, 0x0) 19:25:28 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:25:28 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4020940d, 0x0) 19:25:28 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d", 0x41}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1334.123422] audit: type=1326 audit(1727033128.119:271): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7609 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:25:28 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80045432, 0x0) 19:25:28 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d", 0x41}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:28 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:28 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1334.392415] Module has invalid ELF structures [ 1334.981867] audit: type=1326 audit(1727033128.978:272): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7609 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:25:43 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e", 0x46}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, 0x0) [ 1349.177358] audit: type=1326 audit(1727033143.173:273): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7754 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:25:43 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000007ffffffc) 19:25:43 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80045440, 0x0) 19:25:43 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:43 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:43 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06", 0x11}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:43 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, 0x0) 19:25:43 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e", 0x46}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:43 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80086601, 0x0) 19:25:43 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb", 0x12}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:43 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000007ffffffc) 19:25:43 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:43 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, 0x0) [ 1349.332237] Module has invalid ELF structures [ 1350.025971] audit: type=1326 audit(1727033144.022:274): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7754 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:25:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80087601, 0x0) 19:25:58 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x4, 0x0) 19:25:58 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, 0x0) 19:25:58 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e", 0x46}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:58 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:58 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:58 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:58 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000007ffffffc) [ 1364.160194] audit: type=1326 audit(1727033158.156:275): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7791 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1364.176326] Module has invalid ELF structures 19:25:58 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:25:58 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc0045878, 0x0) 19:25:58 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:25:58 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34", 0x48}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:25:58 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000007ffffffc) [ 1364.266759] Module has invalid ELF structures 19:25:58 executing program 5: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000007ffffffc) 19:25:58 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:25:58 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1364.298113] Module has invalid ELF structures [ 1364.390068] Module has invalid ELF structures [ 1365.006112] audit: type=1326 audit(1727033159.003:276): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7791 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:26:13 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xfc, 0x0, @mcast1, 0x1}, 0x1c) 19:26:13 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc0045878, 0x0) 19:26:13 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x5, 0x0) [ 1379.336315] audit: type=1326 audit(1727033173.332:277): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:26:13 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r0, 0x0, 0x0) 19:26:13 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:13 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34", 0x48}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:13 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000007ffffffc) 19:26:13 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:13 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34", 0x48}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:13 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc0189436, 0x0) [ 1379.396118] Module has invalid ELF structures [ 1379.416738] Module has invalid ELF structures 19:26:13 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x3, 0x0, 0x8}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:13 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:13 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9235b0df85a09f22f27f66aedc4db578f8e9fb623faef7a3e794d6111d1289a16f3347013dab130ec1bc33eafd383cbce9ae6a2c69a00aa9b21cc7481be0b2812ad02d9214ce288be83", 0x93}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7", 0xaf}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:13 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r5}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x4000007ffffffc) 19:26:13 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc020660b, 0x0) [ 1379.495375] Module has invalid ELF structures [ 1380.186094] audit: type=1326 audit(1727033174.178:278): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:26:28 executing program 5: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:26:28 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, 0x0) 19:26:28 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:28 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9", 0x49}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:28 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:28 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) 19:26:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 1394.712435] Module has invalid ELF structures [ 1394.715409] audit: type=1326 audit(1727033188.711:279): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7880 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:26:28 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:28 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 19:26:28 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9", 0x49}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:28 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1394.785728] Module has invalid ELF structures 19:26:28 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1394.901156] Module has invalid ELF structures [ 1395.574234] audit: type=1326 audit(1727033189.567:280): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7880 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1409.820269] audit: type=1326 audit(1727033203.816:281): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7913 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:26:43 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9", 0x49}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:43 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, 0x0) 19:26:43 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:43 executing program 1: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:26:43 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x300) 19:26:43 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:43 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 1409.858830] Module has invalid ELF structures 19:26:43 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:43 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:43 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1409.897988] Module has invalid ELF structures 19:26:43 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x1000000) [ 1409.959018] Module has invalid ELF structures 19:26:43 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:43 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x2000000) 19:26:44 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x3, 0x2, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3000000) [ 1410.097267] Module has invalid ELF structures [ 1410.674555] audit: type=1326 audit(1727033204.670:282): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7913 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:26:58 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:58 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1424.905242] Module has invalid ELF structures 19:26:58 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:58 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:26:58 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0xfdfdffff) 19:26:58 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x9, 0x0) 19:26:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:26:58 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:58 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1424.953993] audit: type=1326 audit(1727033218.950:283): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7967 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1424.986290] Module has invalid ELF structures [ 1424.996094] Module has invalid ELF structures 19:26:59 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:59 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:59 executing program 5: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:26:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0xfffffdfd) 19:26:59 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:59 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1425.111238] Module has invalid ELF structures 19:26:59 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:26:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x100000000000000) 19:26:59 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:26:59 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1425.247830] Module has invalid ELF structures 19:26:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x200000000000000) 19:26:59 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1425.818526] audit: type=1326 audit(1727033219.814:284): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7967 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:27:14 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5600, 0x0) (fail_nth: 1) 19:27:14 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) 19:27:14 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) (fail_nth: 1) 19:27:14 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:27:14 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:14 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:27:14 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x300000000000000) 19:27:14 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1440.054120] FAULT_INJECTION: forcing a failure. [ 1440.054120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1440.054184] CPU: 1 PID: 8015 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 1440.054191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.054196] Call Trace: [ 1440.054215] dump_stack+0x107/0x167 [ 1440.054231] should_fail.cold+0x5/0xa [ 1440.054252] _copy_from_user+0x2e/0x1b0 [ 1440.054273] set_termios.part.0+0x6ad/0x8a0 [ 1440.054287] ? mark_lock+0xf5/0x2df0 [ 1440.054303] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1440.054317] ? lock_acquire+0x197/0x470 [ 1440.054328] ? tty_ldisc_ref_wait+0x22/0x90 [ 1440.054352] ? avc_ss_reset+0x180/0x180 [ 1440.054370] tty_mode_ioctl+0x93a/0xf40 [ 1440.054383] ? set_termios.part.0+0x8a0/0x8a0 [ 1440.054396] ? __ldsem_down_read_nested+0xe1/0x7e0 [ 1440.054412] ? __ldsem_wake_readers+0x3d0/0x3d0 [ 1440.054434] n_tty_ioctl_helper+0x55/0x3a0 [ 1440.054448] n_tty_ioctl+0x56/0x370 [ 1440.054468] tty_ioctl+0x912/0x18b0 [ 1440.054479] ? n_tty_write_wakeup+0x40/0x40 [ 1440.058507] ? tty_fasync+0x390/0x390 [ 1440.058523] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1440.058536] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1440.058550] ? do_vfs_ioctl+0x283/0x10d0 [ 1440.058561] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1440.058573] ? generic_block_fiemap+0x60/0x60 [ 1440.058584] ? lock_downgrade+0x6d0/0x6d0 [ 1440.058599] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1440.058615] ? wait_for_completion_io+0x270/0x270 [ 1440.058635] ? selinux_file_ioctl+0xb6/0x270 [ 1440.058651] ? tty_fasync+0x390/0x390 [ 1440.058665] __x64_sys_ioctl+0x19a/0x210 [ 1440.058680] do_syscall_64+0x33/0x40 [ 1440.058691] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1440.058700] RIP: 0033:0x7f5dc0077b19 [ 1440.058711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1440.058717] RSP: 002b:00007f5dbd5ed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1440.058732] RAX: ffffffffffffffda RBX: 00007f5dc018af60 RCX: 00007f5dc0077b19 [ 1440.058739] RDX: 00000000200002c0 RSI: 0000000000005408 RDI: 0000000000000003 [ 1440.058746] RBP: 00007f5dbd5ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1440.058752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1440.058759] R13: 00007ffd1db4e79f R14: 00007f5dbd5ed300 R15: 0000000000022000 [ 1440.111034] FAULT_INJECTION: forcing a failure. [ 1440.111034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1440.111071] CPU: 1 PID: 8023 Comm: syz-executor.5 Not tainted 5.10.226 #1 [ 1440.111077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1440.111081] Call Trace: [ 1440.111093] dump_stack+0x107/0x167 [ 1440.111106] should_fail.cold+0x5/0xa [ 1440.111122] _copy_to_user+0x2e/0x180 [ 1440.111141] simple_read_from_buffer+0xcc/0x160 [ 1440.111159] proc_fail_nth_read+0x198/0x230 [ 1440.111174] ? proc_sessionid_read+0x230/0x230 [ 1440.111189] ? security_file_permission+0xb1/0xe0 [ 1440.111207] ? proc_sessionid_read+0x230/0x230 [ 1440.111220] vfs_read+0x228/0x620 [ 1440.111238] ksys_read+0x12d/0x260 [ 1440.111250] ? vfs_write+0xb10/0xb10 [ 1440.111271] do_syscall_64+0x33/0x40 [ 1440.111282] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1440.111289] RIP: 0033:0x7f68e710b69c [ 1440.111299] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1440.111306] RSP: 002b:00007f68e46ad170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1440.111319] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f68e710b69c [ 1440.111325] RDX: 000000000000000f RSI: 00007f68e46ad1e0 RDI: 0000000000000004 [ 1440.111332] RBP: 00007f68e46ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1440.111339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1440.111346] R13: 00007ffeb6d6b71f R14: 00007f68e46ad300 R15: 0000000000022000 [ 1440.118866] audit: type=1326 audit(1727033234.115:285): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8014 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1440.125981] Module has invalid ELF structures [ 1440.962922] audit: type=1326 audit(1727033234.959:286): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8014 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:27:29 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0xfdfdffff00000000) [ 1455.551701] audit: type=1326 audit(1727033249.547:287): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8038 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1455.556464] FAULT_INJECTION: forcing a failure. [ 1455.556464] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1455.557453] CPU: 1 PID: 8044 Comm: syz-executor.1 Not tainted 5.10.226 #1 [ 1455.558022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1455.558726] Call Trace: [ 1455.558957] dump_stack+0x107/0x167 [ 1455.559269] should_fail.cold+0x5/0xa [ 1455.559600] _copy_to_user+0x2e/0x180 [ 1455.559931] simple_read_from_buffer+0xcc/0x160 [ 1455.560330] proc_fail_nth_read+0x198/0x230 [ 1455.560699] ? proc_sessionid_read+0x230/0x230 [ 1455.561091] ? security_file_permission+0xb1/0xe0 [ 1455.561506] ? proc_sessionid_read+0x230/0x230 [ 1455.561895] vfs_read+0x228/0x620 [ 1455.562195] ksys_read+0x12d/0x260 [ 1455.562497] ? vfs_write+0xb10/0xb10 [ 1455.562852] do_syscall_64+0x33/0x40 [ 1455.563169] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1455.563596] RIP: 0033:0x7f5dc002a69c [ 1455.563909] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1455.565422] RSP: 002b:00007f5dbd5ed170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1455.566055] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5dc002a69c [ 1455.566661] RDX: 000000000000000f RSI: 00007f5dbd5ed1e0 RDI: 0000000000000004 [ 1455.567258] RBP: 00007f5dbd5ed1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1455.567851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1455.568444] R13: 00007ffd1db4e79f R14: 00007f5dbd5ed300 R15: 0000000000022000 19:27:29 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) 19:27:29 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:27:29 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) (fail_nth: 2) 19:27:29 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:29 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(0x0, 0x0) finit_module(r1, 0x0, 0x0) 19:27:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5600, 0x0) 19:27:29 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1455.580423] Module has invalid ELF structures 19:27:29 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r1 = dup(0xffffffffffffffff) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)) ioctl$TCXONC(r0, 0x540a, 0x0) 19:27:29 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(0x0, 0x0) finit_module(r1, 0x0, 0x0) 19:27:29 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:29 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:29 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:29 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x2, 0x0) 19:27:29 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) [ 1455.657409] Module has invalid ELF structures 19:27:29 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, 0x0) 19:27:29 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1456.390970] audit: type=1326 audit(1727033250.387:288): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8038 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:27:44 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:44 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:27:44 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(0x0, 0x0) finit_module(r1, 0x0, 0x0) 19:27:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) 19:27:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b2f, 0x0) [ 1470.891145] Module has invalid ELF structures 19:27:44 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:44 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x10, 0x0) 19:27:44 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, 0x0) [ 1470.910510] audit: type=1326 audit(1727033264.906:289): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8088 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:27:44 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:27:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b30, 0x0) 19:27:44 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:44 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x8000) epoll_wait(r1, &(0x7f0000000100)=[{}], 0x1, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000080)) ioctl$TIOCSETD(r2, 0x4b49, &(0x7f0000000000)) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000040)) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) [ 1470.965826] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35144 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 19:27:44 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, 0x0) [ 1471.029035] Module has invalid ELF structures 19:27:45 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x4b47, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1471.044238] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34247 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 [ 1471.050729] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53893 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 19:27:45 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f0000000000)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000040)={0x7, 0x8000, 0x0, 0x8001, 0x9, "bea0b2c19dc678d9801b32cb49838e0e3c7393", 0x6}) ioctl$TCXONC(r0, 0x540a, 0x0) [ 1471.062340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53481 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 19:27:45 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b31, 0x0) 19:27:45 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1471.186356] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35656 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 [ 1471.194770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 [ 1471.203875] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33608 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 [ 1471.206758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35140 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 [ 1471.223394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 [ 1471.224520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=8081 comm=syz-executor.0 [ 1471.766968] audit: type=1326 audit(1727033265.760:290): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8088 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 19:27:59 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x4b49, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:27:59 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x14, 0x0) 19:27:59 executing program 0: openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r2, 0x541c, 0x0) sched_getattr(0x0, &(0x7f0000000040)={0x38}, 0xfffffffffffffdd0, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x0, 0xfffffff7, 0x0, 0x0, 0x9, "e35e91852b1941028300000000000089de5e0d", 0xffff}) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000080)={0x1, 0x8, 0x9}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = dup(r3) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000080)={@local, 0x78, r6}) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x23, r6}) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000100)={0x4, 0x7, 0x0, 0x7, 0x7, "3b6589ea086f7dd493ad034825fe29c3b869ba", 0x8, 0xc0}) sendfile(r1, r0, 0x0, 0x4000007ffffffc) 19:27:59 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) 19:27:59 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) (fail_nth: 1) [ 1485.850252] FAULT_INJECTION: forcing a failure. [ 1485.850252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1485.853388] CPU: 1 PID: 8338 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 1485.855020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1485.856969] Call Trace: [ 1485.857597] dump_stack+0x107/0x167 [ 1485.858445] should_fail.cold+0x5/0xa [ 1485.859118] _copy_from_user+0x2e/0x1b0 [ 1485.859463] set_termios.part.0+0x6ad/0x8a0 [ 1485.859826] ? mark_lock+0xf5/0x2df0 [ 1485.860143] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1485.860543] ? lock_acquire+0x197/0x470 [ 1485.860876] ? tty_ldisc_ref_wait+0x22/0x90 [ 1485.861250] ? avc_ss_reset+0x180/0x180 [ 1485.861591] tty_mode_ioctl+0x93a/0xf40 [ 1485.861928] ? set_termios.part.0+0x8a0/0x8a0 [ 1485.862304] ? __ldsem_down_read_nested+0xe1/0x7e0 [ 1485.862719] ? __ldsem_wake_readers+0x3d0/0x3d0 [ 1485.863137] n_tty_ioctl_helper+0x55/0x3a0 [ 1485.863494] n_tty_ioctl+0x56/0x370 [ 1485.863809] tty_ioctl+0x912/0x18b0 [ 1485.864115] ? n_tty_write_wakeup+0x40/0x40 [ 1485.864477] ? tty_fasync+0x390/0x390 [ 1485.864800] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1485.865279] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1485.865714] ? do_vfs_ioctl+0x283/0x10d0 [ 1485.866054] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1485.866494] ? generic_block_fiemap+0x60/0x60 [ 1485.866871] ? lock_downgrade+0x6d0/0x6d0 [ 1485.875265] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1485.875676] ? wait_for_completion_io+0x270/0x270 [ 1485.876142] ? selinux_file_ioctl+0xb6/0x270 [ 1485.876159] ? tty_fasync+0x390/0x390 [ 1485.876173] __x64_sys_ioctl+0x19a/0x210 [ 1485.876188] do_syscall_64+0x33/0x40 [ 1485.876199] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1485.876208] RIP: 0033:0x7f6e2e896b19 [ 1485.876219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1485.876225] RSP: 002b:00007f6e2be0c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1485.876240] RAX: ffffffffffffffda RBX: 00007f6e2e9a9f60 RCX: 00007f6e2e896b19 19:27:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x8) ioctl$KDSETLED(r0, 0x4b32, 0x101) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000000)) 19:27:59 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b32, 0x0) 19:27:59 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, 0x0, 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1485.876247] RDX: 00000000200002c0 RSI: 0000000000005408 RDI: 0000000000000003 [ 1485.876254] RBP: 00007f6e2be0c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.876260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1485.876267] R13: 00007ffe049e758f R14: 00007f6e2be0c300 R15: 0000000000022000 [ 1485.920319] audit: type=1326 audit(1727033279.916:291): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8321 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1485.946685] selinux_netlink_send: 28 callbacks suppressed [ 1485.946695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35144 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 19:27:59 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x408c3, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x600c42, 0x0) fgetxattr(r2, &(0x7f00000000c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000100)=""/4096, 0x1000) [ 1485.957874] Module has invalid ELF structures 19:27:59 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1485.975914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34247 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1485.995905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53893 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1486.005399] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53481 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 19:28:00 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b33, 0x0) 19:28:00 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x15, 0x0, 0x1, 0x401}, {}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x15, 0x0) 19:28:00 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) (fail_nth: 2) 19:28:00 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(r1, 0x0, 0x0) [ 1486.079780] audit: type=1326 audit(1727033280.076:292): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8444 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 [ 1486.119808] Module has invalid ELF structures 19:28:00 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r2, 0x540a, 0xfffffffffffffff9) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSETD(r3, 0x4b49, &(0x7f0000000000)) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000000)) 19:28:00 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)="6baa0d0c7245c4025cb5254bf7be877e06cb3b", 0x13}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(r0, 0x5401, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) 19:28:00 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000080)="861ce49fa704257740884ed11d44841191f165a182b3eb83f45a7d0ff17059a102d62d18021c8af4a61b036f1fa481bebc1bb8e4e8f6efe685d44cfce1833b020d49762cff4e6e34e9b9", 0x4a}, {&(0x7f0000000140)="7246af938c5438add5cf12be836b48a8b48f29163d5115a843afe985cb2d2e1d4cff2dd06895e50bb9d2012ebeaa118ec80e232b57f730e82c4f8cda8d065feab4b4de48d4077dd96813b1d1e8c081c4e20b26f8c06d74336e8e4044fb27d01da39c63c8892829644daa74ced7262e6ec1566fb31b2e3a72d6cb8fd79d4e20df871455f214f8530087adb67996bdd6c45669892441967331575e72eb31c92ec84aa8bc890c8b77b789ed4e40a6df7ba781ce9d28adc24df2c106c4c5acb497108a7e814309839e66eea4d2ee3ccd6d20dfb354dba33ea41906921ebeb6e21b", 0xdf}, {&(0x7f0000000300)="adffb4f3e91cec29a09f400c14998a4ba300158d546c3f9b453d3e7f29e64f5c168b1eaef5dfb319ddbf2f91d2982c6085ccf4e91183cb86880f54137ace23718ad15a28e95ed2c0f6a7cb9b1478444eaf1c969aa8fac03a067032c0b79472d0516568ced51088cbd0fb97599d8b29196b576213f505b82ad07987e03daa8ba6c6c4ad33cd81b5319f51bc4eb01c3f0750b40acdc08decf65ad87ffb31e29c049c4fbc582d87f126a9c1337322abf7e4795a7c6e395dfb89cc45c7dee58f59e661f055488ce382a6582341746cc25884a679bcc8a24e0069153f60d11afce2c9a0156018fd6e864823", 0xe9}, {&(0x7f0000000240)="6baa0d0c7245c4025cb5", 0xa}], 0x4, 0x0, 0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xe41, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[], 0x98a) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "c569676805017c02"}) [ 1486.134809] FAULT_INJECTION: forcing a failure. [ 1486.134809] name failslab, interval 1, probability 0, space 0, times 1 [ 1486.137946] CPU: 0 PID: 8449 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 1486.138656] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.139407] Call Trace: [ 1486.139651] dump_stack+0x107/0x167 [ 1486.139981] should_fail.cold+0x5/0xa [ 1486.140325] ? __lockdep_reset_lock+0x180/0x180 [ 1486.140745] ? tty_buffer_alloc+0x243/0x2b0 [ 1486.141133] should_failslab+0x5/0x20 [ 1486.141478] __kmalloc+0x72/0x390 [ 1486.141799] tty_buffer_alloc+0x243/0x2b0 [ 1486.142178] __tty_buffer_request_room+0x156/0x2a0 [ 1486.142624] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1486.143133] ? trace_hardirqs_on+0x5b/0x180 [ 1486.143527] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1486.144060] pty_write+0xe6/0x110 [ 1486.144377] tty_put_char+0x12d/0x160 [ 1486.144724] ? tty_hung_up_p+0x70/0x70 [ 1486.145071] ? tty_flip_buffer_push+0xd0/0x100 [ 1486.145485] ? pty_write_room+0xc2/0xf0 [ 1486.145844] ? pty_stop+0x1a0/0x1a0 [ 1486.146173] __process_echoes+0x588/0xa00 [ 1486.146551] process_echoes+0xf9/0x1c0 [ 1486.146905] n_tty_set_termios+0x720/0x1010 [ 1486.151319] ? n_tty_receive_buf+0x40/0x40 [ 1486.151710] tty_set_termios+0x5f1/0x840 [ 1486.152083] ? tty_wait_until_sent+0x550/0x550 [ 1486.152095] ? lock_downgrade+0x6d0/0x6d0 [ 1486.152105] ? up_write+0x191/0x550 [ 1486.152121] ? mutex_trylock+0x237/0x2b0 [ 1486.152136] ? n_tty_check_unthrottle+0x460/0x460 [ 1486.152150] set_termios.part.0+0x4f1/0x8a0 19:28:00 executing program 3: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file2\x00', 0x0, 0x90041, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) pwritev2(r1, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0, 0x5) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) finit_module(0xffffffffffffffff, 0x0, 0x0) [ 1486.152167] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1486.152181] ? lock_acquire+0x197/0x470 [ 1486.152192] ? tty_ldisc_ref_wait+0x22/0x90 [ 1486.152210] ? avc_ss_reset+0x180/0x180 [ 1486.152225] tty_mode_ioctl+0x93a/0xf40 [ 1486.152238] ? set_termios.part.0+0x8a0/0x8a0 [ 1486.152250] ? __ldsem_down_read_nested+0xe1/0x7e0 [ 1486.152264] ? __ldsem_wake_readers+0x3d0/0x3d0 [ 1486.152283] n_tty_ioctl_helper+0x55/0x3a0 [ 1486.152295] n_tty_ioctl+0x56/0x370 [ 1486.152312] tty_ioctl+0x912/0x18b0 [ 1486.152323] ? n_tty_write_wakeup+0x40/0x40 [ 1486.152336] ? tty_fasync+0x390/0x390 [ 1486.152349] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1486.152361] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1486.152373] ? do_vfs_ioctl+0x283/0x10d0 [ 1486.152385] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1486.152397] ? generic_block_fiemap+0x60/0x60 [ 1486.152409] ? lock_downgrade+0x6d0/0x6d0 [ 1486.152423] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1486.152438] ? wait_for_completion_io+0x270/0x270 [ 1486.152455] ? selinux_file_ioctl+0xb6/0x270 [ 1486.152471] ? tty_fasync+0x390/0x390 [ 1486.152485] __x64_sys_ioctl+0x19a/0x210 [ 1486.152498] do_syscall_64+0x33/0x40 [ 1486.152510] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.152518] RIP: 0033:0x7f6e2e896b19 [ 1486.152530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.152537] RSP: 002b:00007f6e2be0c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1486.152553] RAX: ffffffffffffffda RBX: 00007f6e2e9a9f60 RCX: 00007f6e2e896b19 [ 1486.152560] RDX: 00000000200002c0 RSI: 0000000000005408 RDI: 0000000000000003 [ 1486.152567] RBP: 00007f6e2be0c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.152575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.152582] R13: 00007ffe049e758f R14: 00007f6e2be0c300 R15: 0000000000022000 [ 1486.152608] [ 1486.152614] ====================================================== [ 1486.152619] WARNING: possible circular locking dependency detected [ 1486.152623] 5.10.226 #1 Not tainted [ 1486.152629] ------------------------------------------------------ [ 1486.152633] syz-executor.2/8449 is trying to acquire lock: [ 1486.152637] ffffffff84f0ce80 (console_owner){-.-.}-{0:0}, at: console_unlock+0x2e1/0xb40 [ 1486.152652] [ 1486.152657] but task is already holding lock: [ 1486.152660] ffff888013c8f158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1486.152676] [ 1486.152681] which lock already depends on the new lock. [ 1486.152683] [ 1486.152685] [ 1486.152690] the existing dependency chain (in reverse order) is: [ 1486.152692] [ 1486.152694] -> #2 (&port->lock){-.-.}-{2:2}: [ 1486.152709] _raw_spin_lock_irqsave+0x36/0x60 [ 1486.152713] tty_port_tty_get+0x1f/0x100 [ 1486.152717] tty_port_default_wakeup+0x11/0x40 [ 1486.152721] serial8250_tx_chars+0x51f/0xb00 [ 1486.152726] serial8250_handle_irq+0x4e4/0x660 [ 1486.152730] serial8250_default_handle_irq+0x96/0x210 [ 1486.152734] serial8250_interrupt+0xf4/0x1b0 [ 1486.152739] __handle_irq_event_percpu+0x2ef/0x6d0 [ 1486.152743] handle_irq_event+0xff/0x280 [ 1486.152747] handle_edge_irq+0x249/0xd00 [ 1486.152751] asm_call_irq_on_stack+0x12/0x20 [ 1486.152754] common_interrupt+0xdd/0x1a0 [ 1486.152758] asm_common_interrupt+0x1e/0x40 [ 1486.152762] default_idle+0xe/0x20 [ 1486.152766] default_idle_call+0xbf/0x2c0 [ 1486.152769] do_idle+0x3ad/0x520 [ 1486.152773] cpu_startup_entry+0x14/0x20 [ 1486.152778] secondary_startup_64_no_verify+0xbe/0xcb [ 1486.152780] [ 1486.152782] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 1486.152797] _raw_spin_lock_irqsave+0x36/0x60 [ 1486.152802] serial8250_console_write+0x9f5/0xc60 [ 1486.152806] console_unlock+0x82a/0xb40 [ 1486.152810] register_console+0x40c/0x850 [ 1486.152814] univ8250_console_init+0x3a/0x4a [ 1486.152818] console_init+0x24c/0x356 [ 1486.152822] start_kernel+0x2e6/0x489 [ 1486.152826] secondary_startup_64_no_verify+0xbe/0xcb [ 1486.152828] [ 1486.152830] -> #0 (console_owner){-.-.}-{0:0}: [ 1486.152845] __lock_acquire+0x29e7/0x5b00 [ 1486.152849] lock_acquire+0x197/0x470 [ 1486.152853] console_unlock+0x360/0xb40 [ 1486.152857] vprintk_emit+0x1de/0x4e0 [ 1486.152860] vprintk_func+0x8b/0x140 [ 1486.152864] printk+0xba/0xf1 [ 1486.152867] should_fail+0x47a/0x5a0 [ 1486.152871] should_failslab+0x5/0x20 [ 1486.152875] __kmalloc+0x72/0x390 [ 1486.152879] tty_buffer_alloc+0x243/0x2b0 [ 1486.152883] __tty_buffer_request_room+0x156/0x2a0 [ 1486.152888] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1486.152893] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1486.152897] pty_write+0xe6/0x110 [ 1486.152901] tty_put_char+0x12d/0x160 [ 1486.152905] __process_echoes+0x588/0xa00 [ 1486.152909] process_echoes+0xf9/0x1c0 [ 1486.152913] n_tty_set_termios+0x720/0x1010 [ 1486.152916] tty_set_termios+0x5f1/0x840 [ 1486.152921] set_termios.part.0+0x4f1/0x8a0 [ 1486.152925] tty_mode_ioctl+0x93a/0xf40 [ 1486.152929] n_tty_ioctl_helper+0x55/0x3a0 [ 1486.152932] n_tty_ioctl+0x56/0x370 [ 1486.152936] tty_ioctl+0x912/0x18b0 [ 1486.152940] __x64_sys_ioctl+0x19a/0x210 [ 1486.152944] do_syscall_64+0x33/0x40 [ 1486.152948] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.152950] [ 1486.152955] other info that might help us debug this: [ 1486.152957] [ 1486.152959] Chain exists of: [ 1486.152961] console_owner --> &port_lock_key --> &port->lock [ 1486.152979] [ 1486.152983] Possible unsafe locking scenario: [ 1486.152985] [ 1486.152989] CPU0 CPU1 [ 1486.152994] ---- ---- [ 1486.152996] lock(&port->lock); [ 1486.153005] lock(&port_lock_key); [ 1486.153015] lock(&port->lock); [ 1486.153022] lock(console_owner); [ 1486.153029] [ 1486.153032] *** DEADLOCK *** [ 1486.153034] [ 1486.153038] 7 locks held by syz-executor.2/8449: [ 1486.153041] #0: ffff888020451098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x90 [ 1486.153058] #1: ffff888020450130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: tty_write_lock+0x1e/0x90 [ 1486.153077] #2: ffff8880204502e8 (&o_tty->termios_rwsem/1){++++}-{3:3}, at: tty_set_termios+0xec/0x840 [ 1486.153097] #3: ffff888020450098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref+0x1d/0x90 [ 1486.153115] #4: ffffc90000754378 (&ldata->output_lock){+.+.}-{3:3}, at: process_echoes+0xaf/0x1c0 [ 1486.153134] #5: ffff888013c8f158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1486.153152] #6: ffffffff84fed200 (console_lock){+.+.}-{0:0}, at: vprintk_func+0x8b/0x140 [ 1486.153169] [ 1486.153172] stack backtrace: [ 1486.153177] CPU: 0 PID: 8449 Comm: syz-executor.2 Not tainted 5.10.226 #1 [ 1486.153184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1486.153187] Call Trace: [ 1486.153190] dump_stack+0x107/0x167 [ 1486.153193] check_noncircular+0x263/0x2e0 [ 1486.153198] ? stack_trace_consume_entry+0x160/0x160 [ 1486.153202] ? print_circular_bug+0x470/0x470 [ 1486.153205] ? memcpy+0x39/0x60 [ 1486.153209] ? alloc_chain_hlocks+0x342/0x5a0 [ 1486.153212] __lock_acquire+0x29e7/0x5b00 [ 1486.153217] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1486.153220] ? SOFTIRQ_verbose+0x10/0x10 [ 1486.153224] ? __lockdep_reset_lock+0x180/0x180 [ 1486.153228] lock_acquire+0x197/0x470 [ 1486.153231] ? console_unlock+0x2e1/0xb40 [ 1486.153235] ? lock_release+0x680/0x680 [ 1486.153238] ? lock_downgrade+0x6d0/0x6d0 [ 1486.153242] ? do_raw_spin_lock+0x121/0x260 [ 1486.153246] ? rwlock_bug.part.0+0x90/0x90 [ 1486.153249] console_unlock+0x360/0xb40 [ 1486.153253] ? console_unlock+0x2e1/0xb40 [ 1486.153256] ? devkmsg_read+0x730/0x730 [ 1486.153260] ? lock_release+0x680/0x680 [ 1486.153263] ? do_raw_spin_unlock+0x4f/0x220 [ 1486.153267] ? vprintk_func+0x8b/0x140 [ 1486.153270] vprintk_emit+0x1de/0x4e0 [ 1486.153274] vprintk_func+0x8b/0x140 [ 1486.153277] printk+0xba/0xf1 [ 1486.153281] ? record_print_text.cold+0x16/0x16 [ 1486.153284] should_fail+0x47a/0x5a0 [ 1486.153288] ? __lockdep_reset_lock+0x180/0x180 [ 1486.153292] ? tty_buffer_alloc+0x243/0x2b0 [ 1486.153295] should_failslab+0x5/0x20 [ 1486.153299] __kmalloc+0x72/0x390 [ 1486.153302] tty_buffer_alloc+0x243/0x2b0 [ 1486.153306] __tty_buffer_request_room+0x156/0x2a0 [ 1486.153311] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1486.153315] ? trace_hardirqs_on+0x5b/0x180 [ 1486.153320] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1486.153323] pty_write+0xe6/0x110 [ 1486.153327] tty_put_char+0x12d/0x160 [ 1486.153330] ? tty_hung_up_p+0x70/0x70 [ 1486.153334] ? tty_flip_buffer_push+0xd0/0x100 [ 1486.153338] ? pty_write_room+0xc2/0xf0 [ 1486.153341] ? pty_stop+0x1a0/0x1a0 [ 1486.153345] __process_echoes+0x588/0xa00 [ 1486.153348] process_echoes+0xf9/0x1c0 [ 1486.153352] n_tty_set_termios+0x720/0x1010 [ 1486.153356] ? n_tty_receive_buf+0x40/0x40 [ 1486.153359] tty_set_termios+0x5f1/0x840 [ 1486.153363] ? tty_wait_until_sent+0x550/0x550 [ 1486.153367] ? lock_downgrade+0x6d0/0x6d0 [ 1486.153370] ? up_write+0x191/0x550 [ 1486.153374] ? mutex_trylock+0x237/0x2b0 [ 1486.153378] ? n_tty_check_unthrottle+0x460/0x460 [ 1486.153382] set_termios.part.0+0x4f1/0x8a0 [ 1486.153386] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1486.153389] ? lock_acquire+0x197/0x470 [ 1486.153393] ? tty_ldisc_ref_wait+0x22/0x90 [ 1486.153397] ? avc_ss_reset+0x180/0x180 [ 1486.153400] tty_mode_ioctl+0x93a/0xf40 [ 1486.153404] ? set_termios.part.0+0x8a0/0x8a0 [ 1486.153408] ? __ldsem_down_read_nested+0xe1/0x7e0 [ 1486.153412] ? __ldsem_wake_readers+0x3d0/0x3d0 [ 1486.153416] n_tty_ioctl_helper+0x55/0x3a0 [ 1486.153419] n_tty_ioctl+0x56/0x370 [ 1486.153423] tty_ioctl+0x912/0x18b0 [ 1486.153426] ? n_tty_write_wakeup+0x40/0x40 [ 1486.153430] ? tty_fasync+0x390/0x390 [ 1486.153434] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1486.153439] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1486.153442] ? do_vfs_ioctl+0x283/0x10d0 [ 1486.153447] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1486.153451] ? generic_block_fiemap+0x60/0x60 [ 1486.153454] ? lock_downgrade+0x6d0/0x6d0 [ 1486.153458] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1486.153463] ? wait_for_completion_io+0x270/0x270 [ 1486.153467] ? selinux_file_ioctl+0xb6/0x270 [ 1486.153470] ? tty_fasync+0x390/0x390 [ 1486.153473] __x64_sys_ioctl+0x19a/0x210 [ 1486.153477] do_syscall_64+0x33/0x40 [ 1486.153481] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1486.153485] RIP: 0033:0x7f6e2e896b19 [ 1486.153498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1486.153502] RSP: 002b:00007f6e2be0c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1486.153512] RAX: ffffffffffffffda RBX: 00007f6e2e9a9f60 RCX: 00007f6e2e896b19 [ 1486.153518] RDX: 00000000200002c0 RSI: 0000000000005408 RDI: 0000000000000003 [ 1486.153524] RBP: 00007f6e2be0c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.153529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1486.153535] R13: 00007ffe049e758f R14: 00007f6e2be0c300 R15: 0000000000022000 [ 1486.162802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35656 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1486.167838] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1486.357667] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33608 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1486.360988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35140 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1486.375306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1486.376404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=64 sclass=netlink_route_socket pid=8319 comm=syz-executor.0 [ 1486.919074] audit: type=1326 audit(1727033280.911:293): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8444 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f847fccdb19 code=0x0 VM DIAGNOSIS: 19:28:00 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822da1dc RDI=ffffffff879ef140 RBP=ffffffff879ef100 RSP=ffff88804cb3efe8 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0f3de75 R14=fffffbfff0f3de2a R15=dffffc0000000000 RIP=ffffffff822da230 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb833f9f700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffeb6d6ae08 CR3=000000000e230000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffff00ffffffffffffffff XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=1ffff110029ed557 RBX=ffff888014f6aa88 RCX=ffffffff8127e9a1 RDX=1ffffffff0a14d12 RSI=0000000000000000 RDI=ffff888014f6aab8 RBP=ffff888014ce5a20 RSP=ffff888016fefc90 R8 =0000000000000001 R9 =0000000000000003 R10=ffffed1002dfdf86 R11=0000000000000001 R12=dffffc0000000000 R13=ffff888046f91100 R14=ffff888008800dc0 R15=ffff888046f91100 RIP=ffffffff816f32d8 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fb67a4d58c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe1f00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff3dcdc23a0 CR3=000000000d1d8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000562e32db4f200000562e32dae760 XMM06=0000562e32d98740ffffffff00000002 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000020000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000