0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:14:26 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, 0x0) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:26 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x0, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x2400, 0x5c) 22:14:26 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1585.116617] loop5: detected capacity change from 0 to 32768 [ 1585.174562] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:14:26 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:14:27 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x0, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:27 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) chdir(&(0x7f00000000c0)='./file1\x00') ioctl$sock_bt_hci(r3, 0x400448cb, 0x0) openat(r3, &(0x7f0000000080)='./file0\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000140)={{0x4}, 'port0\x00', 0x99, 0x120000, 0x9b, 0x80000000, 0x4, 0x2, 0x9, 0x0, 0x6}) 22:14:27 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:14:27 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0x0, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:27 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:27 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x0, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1586.213743] loop5: detected capacity change from 0 to 32768 [ 1586.219348] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1586.236585] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:14:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x9, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4002}, {&(0x7f0000000140)="7550f6ca7e8c856741041a79f50b98561d8bb46d518af329273b77fe5193b90a6c5b02a81f6f3aacc6b9b21196a92133f8543cc79bfe1eee49f8cee855dbf592e11ff78da251290f8e01c0b0ce68f7107333f37ae0a3c0d059a71283a884ee0d27bf861ca2ec9e42515e338b1c8329663b2f1759e71c48f92a9e5452d80f8ab26d7ff067be5e41b0e85e188823bf3d64cd89f65e956f532cd401041c2c48a02ae522bddb53120ddd718f573e6253fca8db47d4751844", 0xb6, 0x6}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240), 0x204c449, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@access_client}, {@access_client}, {@version_u}, {@uname={'uname', 0x3d, 'vfat\x00'}}], [{@pcr={'pcr', 0x3d, 0x2a}}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='./file1\x00', 0x1, 0x4, &(0x7f0000000680)=[{&(0x7f00000003c0)="02d13c92dabf09436dc1d8a44c2085f048b0a81c8fe7d3ddfd492e8b191db5966c64240a8b914ca21a19313c555404f81dd7a4f2e984df6fcdd87c7f4bcf7910ef1b73b8c5c10c40f03126e4e3dd1c722bc3c81291977c422df621a4e29980f0bcfc94a56c1504b512266a8feb6450d3aa0e50cff6a59c2524ec96f02930b063e3ec57d2bc75ed41fa571eef4f22ccca767560b7169eac70f2105fd2e2918a", 0x9f, 0x139fcc47}, {&(0x7f0000000480)="c5c74b560dbef730950f77efdae4f8d942e63bbf7d204cf9bdaf6fffc7ffd4471daa825f4859723bc55364fedd6dbd1ea1f4f90c715c58bcf22fa136570ae0df9e967b6272483f917e5ab75de249b947983904556492cac1e142954eeed630d8019d8912bbe0", 0x66, 0x1}, {&(0x7f0000000500)="2291dbb0fff009285d9cd623facc8878d43b4a7ecef6f36f9eb9341733a635586918ec233b56b80871388bd83ee325441c6e4191a2c18ea50b5f9ac92d8b3fa1cad0365ce31506387f0edf4335a8709768d5c9125fc57336925c6746aa6400f7e538cb846a6a4f0b4c76662cff171b47a9c72d1e8b217b01e2731b99", 0x7c, 0xd9}, {&(0x7f0000000580)="370d7c43b5f308f6465338ba151693d5865ab015e3a7832bb04cf9925daf23dbf345b4db589503ac3cca9a3f85131519ba1dd637f8c9b6fcc16dbc8d01ec4f0ed75abf7da2bf7ad7c40c8cae460354c232e085261f748f545db8eb556978eb4be6017c98d03c65df3e07fe809e7f9f0808c30a403d460bd5d9dd3f13ef5fbe11c4ae20dd7959df97f63ef1b133cb4f7fb0ea0039bc7e2996faee6ceee0daf8310b245ac04e05007cc459558116da4b9477a6676f02fa0c9651d03b1e41a3c74980cc2da7dc9b2ca3ed95820f8ba9dba804", 0xd1}], 0x100000, &(0x7f0000000700)=ANY=[@ANYBLOB="687567653d61ffffffffffffffff67653d616c772c687567653d6164766973652c687567653d6164766973652c636f6e746578743d5f6f077e06998ec39565b137bb756e074a6d6f742c7375626a5f726f6c"]) r3 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000040)) 22:14:41 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:14:41 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0x0, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:14:41 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:41 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:41 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x0, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1599.651545] loop5: detected capacity change from 0 to 32768 [ 1599.693496] FAT-fs (loop5): invalid media value (0x56) [ 1599.694734] FAT-fs (loop5): Can't find a valid FAT filesystem 22:14:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) [ 1599.796597] loop5: detected capacity change from 0 to 117413888 22:14:41 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x0, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:41 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0x0, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:41 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:14:41 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:41 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:41 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1600.472021] loop5: detected capacity change from 0 to 32768 [ 1600.485429] FAT-fs (loop5): invalid media value (0x56) [ 1600.486611] FAT-fs (loop5): Can't find a valid FAT filesystem 22:14:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:14:56 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={0x0}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:14:56 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:56 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:56 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x101, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000201200002000085003a00010000000009da00fa0000000001", 0x25, 0xffffffffffffffff}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = fork() creat(&(0x7f0000000140)='./file1\x00', 0x181) ptrace$setopts(0x4206, r2, 0x10001, 0x3d) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xf8, 0xff, 0x81, 0x1, 0x0, 0x5, 0x80, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x100000000, 0x7fff}, 0x14, 0xff, 0x7, 0x3, 0x11e5460f, 0x400, 0x1ff, 0x0, 0x8000, 0x0, 0x7fffffff}, r2, 0x7, r1, 0x0) 22:14:56 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:56 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1614.841063] loop5: detected capacity change from 0 to 8388096 [ 1614.883513] FAT-fs (loop5): bogus number of reserved sectors [ 1614.884895] FAT-fs (loop5): Can't find a valid FAT filesystem 22:14:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:14:56 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:56 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1615.017555] loop5: detected capacity change from 0 to 8388096 [ 1615.051135] FAT-fs (loop5): Unrecognized mount option "./file1" or missing value 22:14:56 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:14:56 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:14:56 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, 0x0}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:14:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={0x0}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:14:56 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) socketpair(0x28, 0x3, 0x6000, &(0x7f0000000080)={0xffffffffffffffff}) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup(r3) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000140), 0x2) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f00000000c0)={0x1, 0x2}) 22:14:56 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x0, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={0x0}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:13 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:13 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000080)) fstat(r2, &(0x7f0000000140)) 22:15:13 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x0, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={0x0}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:13 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:13 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:13 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:13 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) openat(r1, &(0x7f0000000080)='./file0\x00', 0x204080, 0x4) 22:15:13 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x0, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:13 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000080)={0x9b, 0x5}) 22:15:14 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:14 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) 22:15:14 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0x0, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:14 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {0x0}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:14 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:14 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={0x0}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:14 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:14 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0x0, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:14 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd_index, 0x2, 0x0, 0x0, 0x1a, 0x1, {0x1, r1}}, 0x21) r2 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x40047211, &(0x7f0000000040)) r3 = dup(0xffffffffffffffff) openat$cgroup_type(r3, &(0x7f0000000240), 0x2, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000100)={0x0, 0x68, &(0x7f00000002c0)={&(0x7f0000000080)={0x24, 0x0, 0x325, 0x0, 0x0, {{0x11}, {@void, @val={0x8}, @void}}}, 0x24}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x2120}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r5 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x50, r5, 0x0) r7 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004c902fe2ce3f1050000002d2dbd7000fff4df253100000008605589f5bea36da4fa9a7cb5b0d46e7da343adde5f87da893939772e6731747e0194ba154c5dbbfad658caed893a7d5290436b4ea63f0830ae67256b085a47dfaaa8", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB], 0x2c}}, 0x20040801) syz_io_uring_setup(0x3a79, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, r7}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000080)) syz_io_uring_setup(0x4048, &(0x7f0000000280)={0x0, 0xde26, 0x2, 0x2, 0x1d9, 0x0, r7}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000180)) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f0000000040)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x4004, @fd_index=0x6, 0x1, 0xfffffffffffffff7, 0x0, 0x2, 0x0, {0x1, r8}}, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x5, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r8}}, 0x6) 22:15:14 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:28 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:28 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0), 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:28 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) ioctl$sock_bt_hci(r3, 0x400448cb, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) 22:15:28 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:28 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:28 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {0x0}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:28 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0x0, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:28 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:28 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x0, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:29 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x0, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:29 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {0x0}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x0, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:29 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:29 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x0, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:29 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:43 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) openat(r0, &(0x7f0000000080)='./file1\x00', 0x2c0100, 0x22) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ftruncate(r2, 0x5) 22:15:43 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:43 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:43 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:43 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:43 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x0, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:43 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x0, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:43 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:15:56 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:56 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x0, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:56 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:56 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x0, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:56 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f00000000c0)=0x2) r1 = epoll_create1(0x80000) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000140)=0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001380)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000007c0)={r3, 0x1, 0x2}) socketpair(0x10, 0x4, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), r0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r4, &(0x7f00000017c0)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001780)={&(0x7f0000001800)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042bbd7000fcdbdf258600000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900ff0100006a00e13e6bee2957e83de7000008002700010000000800a100060000000800a100ff07000008002201e10100000800270000000000080022019602000008009f00070000000500180130000000"], 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000240)={{r1}, r2, 0x4, @inherit={0x58, &(0x7f0000000180)={0x1, 0x2, 0x1, 0x3, {0x3a, 0x7fff, 0x40, 0x1, 0xfffffffffffffffa}, [0x2, 0x2]}}, @devid=r3}) r6 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r7 = openat(r6, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r7, 0x40047211, &(0x7f0000000040)) 22:15:56 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:56 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:56 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:15:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x0, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:56 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) link(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file1\x00') ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:15:56 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:56 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x0, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:15:56 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file2\x00', 0x8) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x4}}, './file2\x00'}) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:15:56 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:56 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) 22:15:56 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x0, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:15:56 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), 0x4) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000240)={&(0x7f0000000140)=""/235, 0xeb}) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x1, [0x3f, 0x4, 0x8, 0x800, 0x945, 0xffffffffffffff80]}) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX]) r2 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x40047211, &(0x7f0000000040)) 22:15:56 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:15:56 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:10 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:10 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x0, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:10 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r2 = semget(0x2, 0x0, 0x20b) r3 = getuid() semctl$IPC_RMID(r2, 0x0, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$SEM_INFO(0x0, 0x3, 0x13, &(0x7f0000000000)=""/35) semtimedop(0x0, &(0x7f00000015c0)=[{0x1, 0xc3fd, 0x800}, {0x1, 0x2bf7, 0x1000}, {0x1, 0x8, 0x800}], 0x3, &(0x7f0000001600)) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r3, r1, r4, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r6 = semget(0x2, 0x0, 0x20b) r7 = getuid() semctl$IPC_RMID(r6, 0x0, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r7, r5, r8, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r9, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7, 0x6, &(0x7f0000001440)=[{&(0x7f0000000140)="78eb54d047e60459b60fafcefd42c58d8d2509a2537c9fbb3af2c6859771d942f17a96be9f4a1e85426fa4e289", 0x2d, 0x2}, {&(0x7f0000000240)="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", 0xfe, 0x1}, {&(0x7f0000000180)="3cb5", 0x2, 0x6}, {&(0x7f0000000340)="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", 0x1000, 0x9}, {&(0x7f0000001340)="fae4d6c00a6199ee848198313b321bd5367724f85912c01d3daf71b83a2da85d8960474e73ad228c2b9d9874629f693103329cedcbc12d5489f87ed8af1915d0cfeee38883b6aa94c3395220aaad5eab14207e665417a3b99d9ee6f2dfb9957b5739094bdf53ffae66778d625a9e5609fe3e890ba9", 0x75, 0xfffffffffffffffe}, {&(0x7f00000013c0)="d98f9865c7e0401c69bfa7d511675ebe5834fa3d01cc4d2f1159f6a6c51cf35841a47c3bec0fe30f021e5e65d63efee895429ed46079412871f9573f935fa6a636ed92ff94cc138aee30ed51805e2a993d19c5f34c73d1e1d189ba221aff9afe9bf474a5d9d57e45ad4d92be0694570f", 0x70, 0x2}], 0x120000, &(0x7f0000001500)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',gid=', @ANYRESHEX=r5, @ANYBLOB=',huge=advise,huge=advise,func=KEXEC_KERNEL_CHECK,dont_measure,fsmagic=0x0000000000000008,rootcontext=staff_u,func=PATH_CHECK,obj_role=PATH_CHECK,\x00']) r10 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r10, 0x40047211, &(0x7f0000000040)) 22:16:10 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:16:10 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000380)=""/99, 0x63}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:10 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:10 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) 22:16:11 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x0, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:16:11 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:26 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x0, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:26 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x0, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:26 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:16:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000080), &(0x7f00000000c0)=@v2={0x2000000, [{0x9, 0xbd}, {0x9, 0xffffffff}]}, 0x14, 0x3) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)=0x0) r5 = semget(0x2, 0x0, 0x20b) r6 = msgget$private(0x0, 0x0) msgrcv(r6, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000000400)=""/137) r7 = getuid() semctl$IPC_RMID(r5, 0x0, 0x0) stat(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f00000002c0)={{0x1, r7, r4, r8, 0x0, 0x39, 0x8}, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x686, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=', @ANYRESDEC=r3, @ANYBLOB=',dfltgid=', @ANYRESHEX=r4, @ANYBLOB="2c706f03a2e864411a9bb869a1c260a9000400000000666174002c63612b68653d6d6d61702c6c6f6f73652c7569643c00000000000000360cc5cc99cd58b5078458bdec0c59b6f65c5717ba3f2fcc2cacaa7567e0f4a2", @ANYRESDEC=0x0, @ANYRESDEC=r3, @ANYRESDEC=0xee00, @ANYBLOB=',hash,\x00']) 22:16:26 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) 22:16:26 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:26 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000380)=""/99, 0x63}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x105142, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x7, 0x7, 0x1}) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) pread64(r1, &(0x7f0000000140)=""/40, 0x28, 0x28305877) open(&(0x7f00000000c0)='./file1\x00', 0x143a00, 0x30) 22:16:26 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x0, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:26 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0x0, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25, 0x3}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.idle_time\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{r2, r3/1000+60000}, {0x0, 0x2710}}) r4 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x125942, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r4, 0x40047211, &(0x7f0000000040)) 22:16:26 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x0, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:26 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0x0, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:16:26 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) ioctl$sock_bt_hci(r3, 0x400448cb, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:16:26 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000380)=""/99, 0x63}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:26 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:26 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:40 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file1/file0\x00', 0x8, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="5483268f617bfe2f26bb2108cd2dd48ee2da4efc55c30dae4623938bb539c79919a58efdfac9d3", 0x27, 0x3f}, {&(0x7f0000000240)="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", 0x1000}], 0x800, &(0x7f00000001c0)={[{@dots}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '['}}, {@measure}]}) renameat(r1, &(0x7f0000001280)='./file1\x00', r0, &(0x7f00000012c0)='./file1/file0\x00') faccessat2(r1, &(0x7f0000001240)='./file0\x00', 0x4, 0x0) r2 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x40047211, &(0x7f0000000040)) 22:16:40 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0x0, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:40 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:40 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:40 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:40 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:16:40 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:41 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = dup(r2) ioctl$sock_bt_hci(r3, 0x400448cb, 0x0) openat(r3, &(0x7f0000000080)='./file0\x00', 0x400, 0xc6) 22:16:41 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x0, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:41 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x0, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:41 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:16:41 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:41 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:41 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {0x0}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:58 executing program 5: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x2d8, r0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_WOL_MODES={0x20c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x88c}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '^[/!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}]}]}, @ETHTOOL_A_BITSET_BITS={0xb0, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '&]\xbc//\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(/&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',\'\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xd5, 0x4, "4f1d1e2728dc5bace64095a731daa577079da4736d3ca786f85c02a4a6f0d8c319da990ae7c8125276b50f9caa23350bba951c310196b2848a59eae27c028b809c17c4e2f6d01b8d73a8438f2958ea650c73e4922fc290340ceaf88d86100f72981d89253516f803342249d454ed67add98e8d0699b0bad25af65be568d8a0478ba9a7e19a86bae84f291f25b653147a21d84e53a3653a1fc9ca010de65b549309149cc8257f4d2f533298ee5bf388e22b8523ee9c45a1bef1eadb8e377226215034ab8e7d5a424ff204f411571963346a"}, @ETHTOOL_A_BITSET_BITS={0x24, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}]}, @ETHTOOL_A_WOL_MODES={0xb8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xa4, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9a0a}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\'+}\\$^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x117a}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffff}]}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x40000}, 0x4008005) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000001f00)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001ec0)={&(0x7f00000006c0)={0x17d8, r0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x3bc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x95, 0x5, "1fffbaf519340d8b16a153c9b78db0499a0959aeeccc9fb8038283692ffeec01ea4ee015350856e0053188b4ab964feca50932cf6b5ce6bf4f3606befa28728e277d7496716480153d097dd3d4ae55834dcbe150fec0ead48794ed45c8a4392872a9e84a1af8b6f314d9e2771057f21974d3c92205db8b6185433875af07ea97c0c5bb2aa3328a83a8eb65e641d7862a52"}, @ETHTOOL_A_BITSET_MASK={0x99, 0x5, "c005d231a93d6512aa3d14721ad01a9c6e6be51e0fa3be2e59849c73c66dfdd459f36f641649516b6408f3e8676b01f32252e823d8f8f6168e646f7e0f9e7890a2e0e65054a6c3badd592db44ccb303ed9a95fae83b45b46a649013f5ca3b109e9c7b01b7c4eb2b48eb80b09f0b30ab8a3ae84a7eb4de8417e90c2ffe2565f967774e7549fa6840356660451d613309f9e56109640"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x56}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xa3@+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '^[/!\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '{,,}:)\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xf4, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\'+}\\$^\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+],\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '&]\xbc//\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'&)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa27}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x70, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xbbf}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0x7a, 0x4, "7b2996e12ee1c46c64d90ac40e0b60f469adb23a564788321cf6cc559224d316c5d34194837151b9dc9e07c93349ff357ef7d4cb663a0ccb469864a1e81b8de7ef0db1b18da4295cb54831f8d49c04cda8757331b11cdea86b5f5c6cbca728ea0adee1082e3029913d7835831b0eb262587a0e0740bb"}]}, @ETHTOOL_A_FEATURES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x12c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x78, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\xad..*}$*\x1d\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe01}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xeb5}]}]}, @ETHTOOL_A_BITSET_VALUE={0xb, 0x4, "8c7f4ba4cf9a18"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x5}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x8d, 0x4, "46dafec6c52867bb48aab5706857727011319e359683cee995782a4ac57b9f2e269cdd42a25d1172c2a218c1ae90fbbd48f93f7a6255634a28d143e709143d9fbb307c993037710980e766c6ad459acdce19f4a881c2993d86c2d9cefa0fd2abafa92aaccb94e3a1126c3b2092bf0e699d7c47c1a34c2b0e7a2f00487157c28a64819e5a477884673c"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x204, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x68, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\'+}\\$^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*],\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '.$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40000000}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1a}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x63, 0x4, "7088b1fddbe3c1cb0d3c3c60b618e8caf7211f90e1da3bf1e275a644462d00aa9126725f1e9fe7a4ae87ac5a2aff4ef67ab85a3bc65a7e639cdcf69cf318316bf145a7b673cbf660576cde04dda7f0e81a53dc02508dd24324d275a4ac3abf"}, @ETHTOOL_A_BITSET_VALUE={0x1a, 0x4, "00c5c6573babbd1ce9c7c6ea62b5ec08cd34a216d253"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ',)&\\{.\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe978}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '&]\xbc//\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(/&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '%!(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '%&&,\'|\x04\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '&):,$\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '\'+}\\$^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x60000000}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '*^,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf1c0}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_FEATURES_WANTED={0x10a4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x98, 0x5, "8aa533803b691c3f2dd18d21ec546392705342d16e9281d9d4ab245f2c40d811920ac24b5ac45cbe0efa3d619478b3c934125bdd5b2771defe8dc98c170cb79448992ddcfa154c1f33d6862c71bd7dbfebe69c336e8d5777fde85009d2d24ea6c6d63e173c5271b0576c670c242c0c76b418196dfe6f472fc87003a98ced14bb0e563b35c3082e3d4d0a279a8c32e3fddd412914"}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}]}]}, 0x17d8}, 0x1, 0x0, 0x0, 0x81}, 0x50) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r1, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_COALESCE_TX_MAX_FRAMES_IRQ={0x8, 0x9, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x4000) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000080)=ANY=[]) r3 = openat(r2, &(0x7f0000000100)='./file1\x00', 0x5073c2, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000040)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd_index=0x4, 0x0, 0x0, 0x5, 0x1, 0x0, {0x0, r4, r2}}, 0x3ff) 22:16:58 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x0, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:58 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:58 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {0x0}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:58 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x0) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:16:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:58 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {0x0}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:59 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r2, 0x40309439, &(0x7f0000000080)={0x3, 0x1, 0x2}) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:16:59 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:16:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:16:59 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {0x0}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:12 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:12 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x440000) fstatfs(r0, &(0x7f0000000240)=""/202) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="366f6f66eb58906d6b66732e66617400020120000200008000f80000200040000000000000", 0x25, 0x9}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000000c0)=ANY=[]) r2 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x125342, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r2, 0x40047211, &(0x7f0000000040)) 22:17:12 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:12 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0x8, 0x3ff, 0x100000001}) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000d80)=ANY=[@ANYBLOB="740300004000000426bd7000fbdbdf251200000008003400bb00004de6f88bc7f5ee5842", @ANYRES32=0xee00, @ANYBLOB="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"], 0x374}, 0x1, 0x0, 0x0, 0x10}, 0x55cd145a0736ea36) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r3 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x800, 0x0) close_range(r1, r5, 0x2) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x100, 0x31) sendfile(r3, r4, 0x0, 0x10000000c) write$binfmt_elf64(r3, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xca, 0x3, 0x1, 0x5, 0x2, 0x3, 0x1, 0x2ce, 0x40, 0x142, 0x1ff, 0x100, 0x38, 0x1, 0x6, 0xffe3, 0x7}, [{0x4, 0x0, 0x80, 0x8, 0x69ed, 0x0, 0x10001, 0x2}, {0x4, 0x10001, 0x3, 0x9, 0xfffffffffffffff8, 0x4, 0x2a4, 0x8}], "3a8410c4bb7ace8f854a91a59fab4f821466cceb6105599d830a1180a3f9600e5629b001430bfd65478088638e86acfcd4473de2fca8532f333b9b1ac6a0c5dbc6e88d8d6a7e8e45b2f8cc05458d0adbadd0244981badb44610962760d0a1c669dc28cb98a37f570b8344b39c9cdbe76d989d716534566cea5e174a7e34d297d95ee6e424625fedd0d0b3add027aefe88fb1cc0ea379880ce2e1a7fd78cde933825ce0e25f983e2193f43eee58a6cdeca60a467824a435de4681418be81333ccf60915b9f287", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x776) 22:17:12 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:17:12 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x0, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:12 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x0) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:12 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) unlink(&(0x7f0000000080)='./file0\x00') ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:17:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:12 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:17:12 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25, 0xfffffffffffffffe}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:17:12 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:12 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x0, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:13 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:27 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:27 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x0, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:27 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:27 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x578) 22:17:27 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:17:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x0) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:27 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:27 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xd4, "544d056968f26f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000340)={0x8, [{}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {r1}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {0x0, r7}], 0x5, "b53acec1810ff0"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004a580)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000004b580)={0x0, 0x0, "4bdd5d3d2ddaf21dc569bc4b55064ff31b6d66010c5dcbe0a7de15063446f82cbec8ce7c5d990c94cdf894bcb6a2ffe605f100253fbae5ba951b18bbe8630e7197b8dbc93f29070190cc82f05d6c3ef7b97b82793e4c54406b7e66395ac19481551414629e36562a7dfe9e6d096977cfe9880211ae393045840fb051cef996f1825f43b1fe4c348750b0963f46aa82287535190700fab87be68846ec18f2f3a348d8c8de53f7cf799996596a07981e950d204285e2aa8ade9fd446a6f268ef6478a0fb3ca6a9cd9039a522b6e87551568ce33d916c29875d17e7431a8197c9a5bf74694de182ee86415a5f025993778e9560808a0c662f21997a05be50d01ce3", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001e00)={{r10, 0x4, 0x7, 0x1, 0x3, 0x9, 0x9, 0x9, 0x800, 0x84, 0x2, 0x401, 0x69a, 0x1000, 0xd11}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004c580)={0x0, 0x0, "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", "79c8d239a4dcc4f630d35ca00aab97e34d2e8e81524cfa0b3f7c32b69f1bda044f81c502770e50ed1245909f470891b0e4b75edad7f818f0f5a20b20a2eaedf60b4cfb49f1723d6575810a9ad58d3fb8c91b6972a51667bd59c2146a8d870bb33df49511237c6eba2dc51037b198ffaaf35ccadde220fcaf230b369e62875a7704834973722ed9221573e9492060956521b95e84efbac5c40dc6f714e549eef3b2bec24b183263f94d37a5bd2b04c45ea0b9cec6fa9f35f5bf46e514c546b2d842c7918b72f0d2ea50c42ea180551428d70e3e35371f401f6dd344c285e5827ab0597515fa5a6c23e7970cea4d1a14e861f8910580f7518bb5ca31beb120685cafcd26d7f860d08becdff105e429bf772e7c5f73552c7dfc9554282bee4566822149edac812f43f15e03a8f1087abbf41e843e005206a936a460c5f92aefd1d5ec4f1f7b74ec461672535f2204d8c5b5c14b229f1da9b37f6d5014291cba5a26703fa49ffd887f875b99a863f033bf5a5df8c93c97bec36e2e69b8e08c320142cb63ac9e8ee02b6601adb9fd72411cfa7df898752174bdeb35d1c20688fa6ca306d5a4fac9b583d7a9f93bce778627ede7fcfbc30c8a3f5e1100f611fa4f8596c22ed88a9749380b5425b9a07c0f573943c05a8b7f75aa9a6819b3733fdb793c38250da8b95406b02a8a5a8d8fe02b67c1fe1ad6d72c83447c6cf33b5343419b176310fe5dbaac31c83a4c2f7acb590d305b0d502165d5dac81769861c7b74c40289bc0825c9be6cad779bdd303e13569675edd9228f0de0ffb482fe956f7b136f21eea7b2c9d0d8f868883157f66c12591034ad600525220100f2f288d4cd3f7e9385c67ce29fe352caf11fd4b49da754ffc0f7ecf794be038d4f477fcb370fdb22fb404ae7acd5b3bf09ffe81de2e6fa2a3d8397a6d120080dcd5be75f37284678428ae85ed9326c3f6b9893c8b236be6f484a113172dc99be64c855823a65e17c0d1f407b456c242138a8a9f9fa79f28c0cbaab94f85b178bc41b28d6865bbd8c33ccba5897bf0d5162d4d3d4409af696a9fc637f191477219e40d77ed4de26844a33083a25d17b222a1e4018a2e254e62a0b9d93af6c78ae4f12752da39cd5c1e67f40f450259ff7b8e9dc30a44bd240bff42766e92b3ff13a20c3b2b9c4b00b8be7338eb3f4780b9ecf18a958dc0b01266f9e035486a32a273a52c0521bdf80e72c0d30911202f306d71b484bfcbbde06daf2f9de35387af6df643b37bff142ab41262fe8f3c2ac7e58c13abf559419224e47f41e513678b834efbaf2cf3519a5b16fddbd4473682fd234ac15f87469185f339cde478381698852eeee2375630e46d390b8cd76412254fb15dc975dabb9a4de03e974d6dc02c4daab3cc6dc9e2b9a9bd6fafa08d088365c45d10454560255407844cc91d057ebcf407847709b9173b1e656c20eb2f016c6fe6bbbdb224857bd489936d17233246ec6ae64112d71c255d69e0492314fcb21cc67e65c2f4c66f4eb8eb83f536bf7c4556ddc70dfe978492e1613b69a7fc901ef1a7ac3cbe16214b6d32f616b47f2135a4570401c0084294a351dc1ef5aa105abcd8376ecd00992e30b5a296b792252900c4e8578e62ca4b1668cacd358261d7792cd34de1ccdd13310e7a744ab14c83d4e2f7683c0d51718cc17babfaa102a5bcc4cdf69c706b79500be45665ab8a602eb938cfa309441d280301174a03d3def954322355afb3d674fbc5bc689a11f3225b8b959ec038c8bd99c33e0dceae2bc9136f01922c2416cf70308d62b6f96946e177c96e0ebb31aaab10cfd68eab3827636b7b9e5a2a424c3f080727b459800644d38e84188d203b5bd580a1adc1e693fa0f11de71c564d32b58f564c77a2a828257390fc07be8bab9c09a1283ecc05f064731adc4cf862438e3555da5648d5cd40ff0efeea9d39874f518b89870ab53d99566a279e17d9b6adcb1001cfcfa848a2445d6c11fde209aa52e1545653f6dcdf8e446d0d928ddda67de7f41bd9d63c43d8c0c6505c842888f24613c3be20195a319df25ed86b9f7041e1fafcd07d76abccc796d43649a702b24b3d7500f2fea77292d5238d2007b8ab0853047974af8785ce77812a255a1168da1e4adcdf88b9d2dca734f7abdc1015eb14cba4d48cc65096cb91a0feb16b6b37a8601cac8de38194f5138791612e327585bad9a2a6eb9ac5ffb8335df23a31a3c6765b7597c2f9f18d208cbb778c9a5acff4875b2f1b3f1cb783f351483b86188da9bd73ac7c7b76e53c7f02583d6c608df77e444c61ff048d8e334f245141256ba155b391a8624765bc33367059c184b0f74db81a4ec7c82c7c74b6dd49de1adc239c368fa4d291c360fd8b9b48febdd919abc1d24dbf77bdb63ca8a19340fdb1f50af351ff0eba22da0630b489f43a38261e0390597631211ca90e88605f9c83ffa89e00ed979dd129b841a3d06d2c6e90060c40831f58be79d4f4acb48b032e717c0c41e466a29b48b53a0d025613eee6882a0ffe3c93b1bf4cc4c296d0bffc3f2771206c30179c8227a1bdf6d1c5ef4f62074019ddb12837e508c273a2d2b3c3aa6ee5c820f5c03d2082194e00bb44e6a9802e511be6f51aab6657aa6c7745b1b118921f3561dff9f0ea545012b188243e2b8b28125b6198572ab3643ad44b4179f47b031be4a731b2f73fa5c3bc6b04a2ba01c991a4d037bfe9f4c964dc61ce618d590c6baee482caa66c6d9f2b927ecbc55c0234ce9882eca827a4ea26fba61e9c2545679bc4b6187f37d7e81b54f9cbd834500d0ca5bf148e7f05147ec142dc5c9de6c49ecf39f560bb5470616c52a7f041454b03aece0cc2ecf5b2c282c186e2eccfc88c665007b19a2a9b7f1e0847b8501aa42df2f8cdddc300486ad7ac06a185409c2ff28a2aeb350477cabcccbd9e1cec33c6ecd3cbcea36f410f3bf04260afb2acb2d4b657edc06d7bf6d62d3759f66b969877eb637a9482291e0621c53139002dc31aedc587776c968142ea853ddfe3b500f380f7a155c088bb12a4d0cb0e0cbd086ee92ab958e6dac08f24e320df16c91b9ddb8ea53171488933c77a397cfabb1fc45cf336758e2334d0e92a90a999282331d8d313e2f2862dd44ff27742d7781a0b188544e59404771d7aeb6bfe244af429f8053dd078fd54bdaaad5c80969773c8d8f685e8418ac5760ffaf7aa64aff01b43efd3a99a6e4c840889369413d60f64ab5aa70aeab28cdb2e83592fab478643a2f9a944db274d7528fb99b85ed4c708f9288166b73a8091f6b097fbfc71bd4b9c99b34c95a0fbc9656abe8cb48904f0a5146f9f119bb09f42fd83e4cf0a6a2ca8ab04a24c70aa675339793e5c0d32e02c26707ceb9617058e4cd5307694df8267b2881e482c92c06a5ba6a90ffa52831a21b4972786780a74ac10e5ecbde63f54f1ec2cfbb88d833993c8e9000b8a58be5ea8f3322c8d6fdd47a88b98e0b13970c34be1e10668e58102bcb0defb071c21c22864f4a40e51137a7da05433dab3624239a9206950b8976e676f1909f226dcef45e2933568585f64ae26123b67ab88c1eb4e4d1deb93d79c540316139373e6ea5c4149c500cb50cee539c9e16f915054824bf510ae32f9cba89f97470b3c5b2231802df77b4640002fe9c66b79861c88a7877b36fcc36d524d7ebf9a40f640fc5408bcf60c4d7155ac03d7b738d3fc67016451d31e712624e952ad5b71bb3359452e3ecb8fb2af0b8a93e28aff2bae0aea71c5556ec40c2fd115cda5866aad52e78d9612e95e7e087792ddd6e7254fe9c424d936c2684dd55bc3929e919c9742b15aa8f18fbaba93893480988276bb38f22b1c5032af350f81a9b95cfb9efff83ab8776348536bbfe1a066dfee8813c218e9ecafb6b221df898a5d5da2c3dd1b9b1f83e0f8749cb74e7d3934a7cdb58221b62b1c692fd399e0a9e23100c49ebe377a7181edd4be6745ed2b39446b47facc4ec7769a50bec710bdb1e3ed8817953a16506d2e281d65c9cde98b70034298f2a97e81b425f49d81c6813934527da171e81140ac0bbe65fdb12db0b684e614a6ef76097b15d7a8eabfdae71ce42da371eb17ddaf4cf47f549599339f13b5dd9e21558b41b8ae48c4e867a992f8532f70a2ab45e66575a32bcd878af02203619e7c2d91dc4ec93c942b1ce2c68c3abf88d6c089d60465d0ba2acdfdca3a479be4fdca5259e2f433d2e641b279af9d2cb5dec23456c0fb0a40f73d98de6251871682e50924b3ae1269f09bb86309a9c85a3f6f65ba2a5e32c47647439df6b4ca4896d81163320864a04f89c48c652b5e7553e3b98c46777b24798a936b7087eaa01980da676fd67b1724e83355662e705ec1f3d6c8adcb3b6765f08b9650cb503f5a7fa125c69784d5e2d7dbb14df3877b85dfe7da1489a3c49402e8e4bc1468f0be06fcd483a8126813c4c1249d6f4255f0b577d5cbe3bce1b4a14a796d38b0ef67fcc610a8189d1eecdca570fa35e65dcb19d0d282b8de328a54e130af81fbb6ecd8a80954b8c222ea68c781311f58695b733adf4ea375406ce355b6c3f43b23daaadefafc294f2367863fb8fe938dc923c95a0408ee7ec6b47041dd28b9879d7a3331f963f0cc1f0d9dc4028cb43814ad95ce68a2bc26a446c682deb3f26eec337632cd0700baf65714d9e034396624f08867cb1ec6929921e80b3a489e1e8992a41568c155f825ddd585326b69c2a2177cc92ed32fb71b7d04d6bc692946594a70a988ea8c54c6c4c2924f746c666fc23b7816c27ee6010e167ea867cf143ea6a24817adad6a4da6c502ac837b4be36140f3d193eaeeff944c092c6b973b911d664fc79392f47a92988ed2900273c640d42bee2d0ee16b08774da9b293288fdb4ccef6c71f3aa4b3c38834ae51f2e4c82d84b3c7b9b6744f9b1f4c6846c547e065ee50b6f68e351a530039e36666273bb7592bef7b7ee4bc9b25526ddb31af1fae0b12b351b2672e5e033a31572a2949c019976f071b9aa7978ee705ee53b5423e721c32de5052c1298d0f18727b44acbc4c3633d8bae4c454df1328d01e64ef43e14ac0519878dad362bbd77454fc4cc7fbd563cb96f06275b4e783f280458721a07cdce598a8b63668e065318386c9b02ad4e71c51ca0d085f89033eb4fd47d49eab1e271f358bd2a3e4d4c54568215f2f8f8e28d1e4d73a3173346e1b64633ca863a80e0212e7c8a2705bdbf5fd84f32efd92cffa596a1e2fdf9ee042ce46e1faf286b2e3c342e3299a9d3a0ead6fc326e2806ae4cea79ba844481741b0eac501075bd921c93910bfbcbbab9cb6fc573aba3473d742d665cc6d729456cd2401c702438d9a6ac0620b20885339fdc8f0818dcb91833cbb108fb2bb2c0e1601f1ca6d4f312906026f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r18}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004d580)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {r12, r13}, {}, {r14}, {0x0, r17}, {r18}], 0x1d, "b07054cb9bb134"}) r20 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r20, 0x40047211, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f00000000c0)=0xe8) fsetxattr$security_capability(r20, &(0x7f0000000080), &(0x7f0000000140)=@v3={0x3000000, [{0x1, 0xffffffff}, {0xffffffc1, 0x5}], r21}, 0x18, 0x0) 22:17:27 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x578) 22:17:27 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:28 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="432c5964dd573e66cddaf1718812c727282b2c5b744f19a26c934f695efd811cac45048bcc56c070766f13b39c3078208fe75cd5e5517ee7b9fb51d3f1f2db8d2410c4e6b819d1ebc0657aff8039beccaf47f630f4a16c1a3a5a12747b54583be0511e9338f89606aeae01e5a559244f162ff53d28e5c0ff74e61ceec18c5279a7b24669e38654bdb84aa0f5a7fa", 0x8e, 0x7}, {&(0x7f0000000240)="3f7f3062ebe8e0e3482665dc7339aa735bf6ce4143c95fb0e7a93b6d34ac83af6822708fdd2b4610ed5494e1bb271b8be34959c48eb3057ab2c0e2191d9e017e75f265ba3f03c48eef1328faeb7fef761d01a8060b7f465f3e5e264aa5dcae4a9c", 0x61, 0x8000}, {&(0x7f00000002c0)="b59cf7a68c83f3f3e21eda1599ee1d7bab02d114ea73bcf4f55557e1725765cdb1540597e6d81a358fef3ed18898321fd1412d47c3749528387799e468b7152438954808fd3f03c0af40b1a1b627d4a389de633ba775e9dc0beafa739932148ed30cbecbe8d802e129655d2f984bed574a5b8990df2ed748a108b12594f9967dfa9197538c94d5b13e38bec814251078e1bbd5a11a164a80806a5a26e3ec7b09f0e8f5fd4228fc5e7e", 0xa9, 0x1}], 0x2000000, &(0x7f0000000400)={[{}], [{@fowner_eq}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}]}) openat(r2, &(0x7f0000000440)='./file0\x00', 0x40a201, 0x40) 22:17:28 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000380)=""/99, 0x63}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:28 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x578) 22:17:28 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:28 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x0, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:28 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, &(0x7f0000000080), 0x4) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000080), 0x4) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r3, 0x0, 0x0, &(0x7f0000000080), 0x4) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r4, 0x0, 0x0, &(0x7f0000000080), 0x4) r5 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000240)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRESDEC=r2, @ANYBLOB="644d483736b172207697a1b893996b3beb46b77259e54ea0f597", @ANYRES16=r1, @ANYRES64=r2, @ANYRES16=r3, @ANYRES64=r4]) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xb) r6 = openat(r5, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) bind$802154_dgram(r2, &(0x7f00000000c0)={0x24, @long={0x3, 0xffff, {0xaaaaaaaaaaaa0102}}}, 0x14) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r6, 0x40047211, &(0x7f0000000040)) 22:17:28 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:28 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c1", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5de) 22:17:28 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x1010, r1, 0x8000000) r3 = syz_io_uring_setup(0x6f8c, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = dup(r6) sendmsg$NL80211_CMD_GET_WIPHY(r7, &(0x7f0000000100)={0x0, 0x68, &(0x7f00000002c0)={&(0x7f0000000080)={0x24, 0x0, 0x325, 0x0, 0x0, {{0x11}, {@void, @val={0x8}, @void}}}, 0x24}}, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x2120}, 0x0) sendmsg$NL80211_CMD_CONNECT(r7, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x60, 0x0, 0x1, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x2000, 0x3, 0x0, 0x0, {0x49f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x400, 0x5, 0x3}}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x6}, @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x17, {0x2, 0x40, 0x1, 0x7}}}, @NL80211_ATTR_PBSS={0x4}, @NL80211_ATTR_WIPHY_FREQ_HINT={0x8}, @NL80211_ATTR_DISABLE_HT={0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x40c1) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) syz_io_uring_submit(r8, r5, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000080)=@IORING_OP_NOP={0x0, 0x3}, 0x1) 22:17:28 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) syz_io_uring_setup(0x6f8c, &(0x7f00000002c0), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f0000000100)={0x0, 0x68, &(0x7f00000002c0)={&(0x7f0000000080)={0x24, 0x0, 0x325, 0x0, 0x0, {{0x11}, {@void, @val={0x8}, @void}}}, 0x24}}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x2120}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000080)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd_index=0x8, 0x0, 0x0, 0xfa8c, 0x4, 0x1, {0x0, 0x0, r0}}, 0x9) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r7 = dup(r6) ioctl$sock_bt_hci(r7, 0x400448cb, 0x0) sendmsg$GTP_CMD_DELPDP(r7, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x44, 0x0, 0x108, 0x70bd2c, 0x25dfdbff, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_LINK={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_VERSION={0x8, 0x2, 0x800}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_NET_NS_FD={0x8, 0x7, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x895}, 0x80) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1dc, 0x0, 0x215, 0x70bd2b, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x1}, 0x48080) [ 1766.884404] loop0: detected capacity change from 0 to 32768 [ 1766.912261] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:17:28 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c1", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5de) 22:17:28 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000380)=""/99, 0x63}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1767.067596] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:17:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:28 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c1", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5de) 22:17:43 executing program 5: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc70e, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x40, 0x1, [{{0x9, 0x4, 0x0, 0x1, 0x2, 0x3, 0x1, 0x1, 0x7f, {0x9, 0x21, 0x101, 0x81, 0x1, {0x22, 0xe14}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0xa8, 0x3f, 0xa6}}}}}]}}]}}, &(0x7f00000002c0)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x200, 0x2e, 0x8, 0x9, 0xff, 0x1}, 0x32, &(0x7f0000000140)={0x5, 0xf, 0x32, 0x5, [@ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0xf8, "31171429f29ef95d09525b855b62b54f"}, @ssp_cap={0xc, 0x10, 0xa, 0x4, 0x0, 0x9, 0xff00, 0x8}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0xd, 0xa, 0x7}]}, 0x3, [{0x37, &(0x7f0000000180)=@string={0x37, 0x3, "9828a8a01b1b910d2a8bf4fa70b484a075eb2394f208bbc2a83195e00e53c2377965db8650d7e5c8256f4ce9360a1f5b69b3fcbbb9"}}, {0x6e, &(0x7f0000000240)=@string={0x6e, 0x3, "91cc40e932989b4d30b2e27241178acb317edd72248683351789bca9ac525ab941e254ab3f3f925ea8c93ecbe168db445d049bc959a300f66ce83b858cd8465070dcccad8d931c4274ed8abc54df229203b3c6ce1ef88ebc6b9df8248b616369174618ed86764a8c74dc0e57"}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x1c01}}]}) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000300)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0x54c, 0x9cc, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x8, 0x30, 0x0, [{{0x9, 0x4, 0x0, 0x6, 0x2, 0x3, 0x1, 0x3, 0x3, {0x9, 0x21, 0x7ff, 0x1f, 0x1, {0x22, 0x5e5}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x0, 0x81, 0x1}}}}}]}}]}}, &(0x7f0000000bc0)={0xa, &(0x7f0000000340)={0xa, 0x6, 0x310, 0x40, 0x4, 0x9, 0x10, 0xff}, 0x249, &(0x7f0000000380)={0x5, 0xf, 0x249, 0x6, [@generic={0x3c, 0x10, 0xa, "a1ee3eafcea8bc648d2153e66313e560dfd2b425642ae5d70ffdd73a4aeeb275e18df86c4080e292a378df93e3bf6c07513e261d42b0a0d8cf"}, @generic={0xe0, 0x10, 0x3, "028cdd75858b3649b1c6df85995db080f29e09e3c3c6280e8771df3990758d6f4b33019c82a311fb3c0c6aeebae54eef43a23162bb07d38a1cb6206268910dcae3200901e0c4e58dada8ba7b76fe1b8e7736e415fbabacc4559899c68fe7d0169ee56d01da3d07231f0ba53b4eaef751a3082ad6c4ef6370af44b844478811834930bea55c4a2800b3bc04a2c87ce07e67756a4757662f135ff54a39111e421876eeb1d155fa7797e7cb287e9f02f7fc4cd0d6cf1e61b3440ab3f7a8c45c1a55822a0924e1d488bf5d56500b7484e0c7a557c7108c3154e4214268d29e"}, @generic={0xf7, 0x10, 0x8, "c4cec0c988b78bf9c80077bd981c0cf0ba781b32bb6c3fda303f24048c05797052d946e2198dec3995a6396925113c11b86de7b1f5ce6818263e4cbd4d97c6acd00e908e2fd501da2bf9d2b5f3f7fb7d67035b666ee31776e91c497265f4f82a5743aba82193785802866800a4772b9d7955b6ee0f2da2d99fd26192848274bc82679c7dc7ed949eb3d246a4dc4c4135c6a509a84ac47fb3bc4a8f78f97860713964ef4e0cce082563d925b945d262d42afe7ee0188927094d38becaae946ccc7bfcf169e3f252ad91fc6b35dda67b46e3a4fbf053b90846aab54ce7281d973ed4a869df086dc8ccfb6e78360568b58db6ade317"}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x6, 0x9, 0x40, 0x4}, @ssp_cap={0x24, 0x10, 0xa, 0x0, 0x6, 0x9, 0xf0f, 0x5, [0x56f4435bd07bd8db, 0xff0030, 0x3f00, 0x735e614d6704eb5b, 0xff0000, 0x3f30]}]}, 0x9, [{0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x3c01}}, {0xb4, &(0x7f0000000640)=@string={0xb4, 0x3, "3c1f2a94ef7283b1bb1307c4012110ca247cb0cd9e9fef712ea2d157df20f94f4fa6865c625afcaea9c6d470edc954c56077a2d73d20b4f3d66f54f36684f1e303d10f9e7a51de99f1bcfb141dc5858b0146555cddd554d0bb7b734e94710dc9169cf46c1a7a95eac3cff5274521125f6490d3b600a32dc060bab427d15573b420332b82d72c50a1c7acf8c65a057a61b21b6df3ecd5560f978c60ec56ee27c6c711526add87d643c4d1a076c197f1482f17"}}, {0x95, &(0x7f0000000700)=@string={0x95, 0x3, "1bb1316e65bf61387bc719ec79ee88c144074cd951d184730cf65c1fd5d25fa490a08a2b27d1778df1e25ce50747e5ad093e54d9a1e8873f46dfb1f2c161e55e8782b5aaac1fc9322689dc2625f100b2b5cd6bcfeadd2b34640de25994ba00af956929fbb9bacf8929f063c96e1b35659c413d335f87b521d37b48793c5059557916ac223bded0e0caaf7cc1153c3119de4b19"}}, {0xb8, &(0x7f00000007c0)=@string={0xb8, 0x3, "4ae589391042f27c7c124672e9234a675e2ad4a7e8e0604a11522217f0158205ac7de9e2984967bbcab169d89e7209a0c51caf204bb078039ef9c4aa02349f5d9918fa58e4c7aa8e24ccc52bd8dee32d83aeead937a28041228b937ec9d04941d557c37d884884021d2768cc91ca7ba037f2e46453f0e24176ef5a9a4e6d2c2a05773692227f563e4efbb530f01a60e193025261290264562ff991944978c81f3e900930b9e6e2e522906093468a0bd4822be71946a8"}}, {0x4, &(0x7f0000000880)=@lang_id={0x4, 0x3, 0x1c0a}}, {0xd6, &(0x7f00000008c0)=@string={0xd6, 0x3, "bd1eaa6c7e63693f0a8024e8811c1d4b837a9890d61b5cda59977970631bde7224a9448e0bfcb0ebb5199d0213d4cdd34e7e11428ee622920990107f2e2a297dccd0e1bc4e81acab6753ddb84540703869101e2982c6a338901a0b740a34158cdbdba14687d0d178b4237af7110fd15453044645f34516659185d9c567c6cf003cbf865d6c646cd90d4eb710872582616a2798d336a6437fe0c7da489e646e2fc90447b60df651fc9dfee2123bdd1358714b309802dd6ec6ec1c9012b2dcda05c8c69b64f71ea3a130a3816ba4e1e04a38a3b869"}}, {0x9b, &(0x7f00000009c0)=@string={0x9b, 0x3, "f47b8af595c193ae70454dfe5874edbc5a7eeb379f8fe64fe3740e41bd26aaf331d755de7b53039a97afdef0df8cd43b85858e175506cb33aa9898f53fa8708ce3d1f56cf42813a8a34f6bef7aabfd6584be4ae7f10dc1cf0ab18c73b906ee408eba858a521bad85403f7328ed6ea448b33c2f496150b35af2f5d2bd00367917363ebae37aa47d1bc2a5d82a325b0d618bd3c544945d05efa4"}}, {0x100, &(0x7f0000000a80)=@string={0x100, 0x3, "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"}}, {0x4, &(0x7f0000000b80)=@lang_id={0x4, 0x3, 0x44a}}]}) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) 22:17:43 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:17:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:43 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x0, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:43 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fc", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x611) 22:17:43 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000000380)=""/99, 0x63}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:43 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:43 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000380)=""/99, 0x63}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1782.083172] udc-core: couldn't find an available UDC or it's busy [ 1782.084697] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1782.618773] udc-core: couldn't find an available UDC or it's busy [ 1782.620488] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 22:17:58 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x0, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:58 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fc", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x611) 22:17:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x608081, 0x129) r1 = openat$cgroup_pressure(r0, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) sendfile(r1, r2, &(0x7f0000002d80)=0xb2f, 0x8000) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x40047211, &(0x7f0000000040)) 22:17:58 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:58 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:58 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:17:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:58 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:58 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fc", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x611) 22:17:59 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3fa", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x62b) 22:17:59 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:59 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) lseek(r0, 0x1, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:17:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:17:59 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:59 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3fa", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x62b) 22:17:59 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:17:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:17:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendfile(r3, r0, &(0x7f00000000c0)=0x1, 0x1f) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) sendfile(r1, r1, 0x0, 0x800) 22:17:59 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3fa", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x62b) 22:18:11 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:18:11 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:11 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) lseek(r0, 0x1, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:18:11 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendfile(r3, r0, &(0x7f00000000c0)=0x1, 0x1f) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) sendfile(r1, r1, 0x0, 0x800) 22:18:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}], 0x1) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:11 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:11 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x638) 22:18:11 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0xc0185879, &(0x7f0000000040)) 22:18:11 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x638) 22:18:11 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0xc0185879, &(0x7f0000000040)) 22:18:11 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendfile(r3, r0, &(0x7f00000000c0)=0x1, 0x1f) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) sendfile(r1, r1, 0x0, 0x800) 22:18:11 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:11 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0xc0185879, &(0x7f0000000040)) 22:18:11 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x638) 22:18:11 executing program 5: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:24 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:24 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x0, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:24 executing program 5: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:24 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x63e) 22:18:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4004}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x16d040, 0x76) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) r3 = timerfd_create(0x8, 0x80800) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x9, 0x3, 0x2, 0x96}) r4 = signalfd(r3, &(0x7f00000000c0)={[0x1f]}, 0x8) sendfile(r4, r0, 0x0, 0x10000000c) 22:18:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) lseek(r0, 0x1, 0x4) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:18:24 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:24 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1822.989892] loop0: detected capacity change from 0 to 32768 [ 1823.000904] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:18:24 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1823.062468] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:18:24 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000040)) 22:18:24 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(0xffffffffffffffff, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:18:24 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x63e) 22:18:25 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x63e) 22:18:25 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x0, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:37 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:37 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:37 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x18084, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) sendfile(r1, r2, 0x0, 0x10000000c) 22:18:37 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x0, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:37 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e4", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x641) 22:18:37 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(0xffffffffffffffff, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:18:37 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000040)) 22:18:37 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x18084, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) sendfile(r1, r2, 0x0, 0x10000000c) 22:18:37 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000040)) 22:18:37 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e4", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x641) 22:18:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40305828, &(0x7f0000000040)) [ 1836.144200] loop0: detected capacity change from 0 to 32768 [ 1836.187826] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1836.305256] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:18:50 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020120000200008000f8000020004000000000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x18084, &(0x7f0000000040)=ANY=[]) r1 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000040)) sendfile(r1, r2, 0x0, 0x10000000c) 22:18:50 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:50 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x0, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:50 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e4", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x641) 22:18:50 executing program 5: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0), 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:50 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(0xffffffffffffffff, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:18:50 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, 0x0, 0x0) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:50 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:50 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r0, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r1, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:50 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x643) 22:18:50 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 1) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:50 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1849.187653] FAULT_INJECTION: forcing a failure. [ 1849.187653] name failslab, interval 1, probability 0, space 0, times 0 [ 1849.190534] CPU: 1 PID: 9784 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1849.192098] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1849.193992] Call Trace: [ 1849.194602] dump_stack+0x107/0x167 [ 1849.195438] should_fail.cold+0x5/0xa [ 1849.196311] ? iovec_from_user+0x36c/0x400 [ 1849.197280] should_failslab+0x5/0x20 [ 1849.198152] __kmalloc+0x72/0x390 [ 1849.198949] iovec_from_user+0x36c/0x400 [ 1849.199886] __import_iovec+0x67/0x590 [ 1849.200785] import_iovec+0x83/0xb0 [ 1849.201614] vfs_readv+0xbb/0x160 [ 1849.202406] ? vfs_iter_read+0xa0/0xa0 [ 1849.203295] ? __fget_files+0x2cf/0x520 [ 1849.204208] ? lock_downgrade+0x6d0/0x6d0 [ 1849.205151] ? find_held_lock+0x2c/0x110 [ 1849.206095] ? ksys_write+0x12d/0x260 [ 1849.206965] ? __fget_files+0x2f8/0x520 [ 1849.207889] ? __fget_light+0xea/0x290 [ 1849.208776] do_readv+0x139/0x300 [ 1849.209571] ? vfs_readv+0x160/0x160 [ 1849.210419] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1849.211630] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1849.212805] do_syscall_64+0x33/0x40 [ 1849.213646] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1849.214813] RIP: 0033:0x7f313bf62b19 [ 1849.215660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1849.219835] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1849.221552] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1849.223161] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1849.224775] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1849.226391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1849.228005] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:18:50 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:50 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x0, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:18:50 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:50 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 2) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:18:51 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1849.365206] FAULT_INJECTION: forcing a failure. [ 1849.365206] name failslab, interval 1, probability 0, space 0, times 0 [ 1849.366682] CPU: 0 PID: 9795 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1849.367469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1849.368399] Call Trace: [ 1849.368698] dump_stack+0x107/0x167 [ 1849.369108] should_fail.cold+0x5/0xa [ 1849.369537] ? create_object.isra.0+0x3a/0xa30 [ 1849.370053] should_failslab+0x5/0x20 [ 1849.370482] kmem_cache_alloc+0x5b/0x310 [ 1849.370942] create_object.isra.0+0x3a/0xa30 [ 1849.371448] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1849.372022] __kmalloc+0x16e/0x390 [ 1849.372428] iovec_from_user+0x36c/0x400 [ 1849.372889] __import_iovec+0x67/0x590 [ 1849.373335] import_iovec+0x83/0xb0 [ 1849.373746] vfs_readv+0xbb/0x160 [ 1849.374136] ? vfs_iter_read+0xa0/0xa0 [ 1849.374577] ? __fget_files+0x2cf/0x520 [ 1849.375025] ? lock_downgrade+0x6d0/0x6d0 [ 1849.375499] ? find_held_lock+0x2c/0x110 [ 1849.375959] ? ksys_write+0x12d/0x260 [ 1849.376391] ? __fget_files+0x2f8/0x520 [ 1849.376842] ? __fget_light+0xea/0x290 [ 1849.377286] do_readv+0x139/0x300 [ 1849.377678] ? vfs_readv+0x160/0x160 [ 1849.378102] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1849.378702] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1849.379293] do_syscall_64+0x33/0x40 [ 1849.379719] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1849.380303] RIP: 0033:0x7f313bf62b19 [ 1849.380723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1849.382804] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1849.383676] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1849.384486] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1849.385288] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1849.386092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1849.386896] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:18:51 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x920420, &(0x7f00000000c0)=ANY=[]) setfsgid(0xee01) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb052) syz_io_uring_submit(0x0, 0x0, 0x0, 0x4) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0xffff) syz_io_uring_setup(0x52dd, &(0x7f00000003c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, 0x0, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index, 0x8, 0x0, 0x0, 0x2, 0x0, {0x0, r4}}, 0x10000) syz_io_uring_submit(r2, r3, &(0x7f0000000080)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, 0x1, 0x1, {0x0, r4}}, 0x101) syz_io_uring_submit(0x0, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) sendmmsg(0xffffffffffffffff, &(0x7f0000000d00)=[{{&(0x7f0000000240)=@llc={0x1a, 0x205, 0x80, 0x5, 0x0, 0xc0, @multicast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000740)="b176a08d9b7d098d4e72c3bb7e2d92ea3f9976c0b0c58fb240439911cf71b1ee56131140c6b41dc38d5086dc3be4968fac87ac3cf4f25e47ef1fbbe1d5c6cbe8a5daafe34afe5d4d01153534f0167b40045c6539b75fca329350b215b397d5d952986d60080099554b307b058e552d620275a4459141b8181edf205b11b9da9d0d163ebe01ed59bc33f9d2c1ce4047c4272a18c762637cf0ae", 0x99}, {&(0x7f0000000800)="4cd0a99b69fc8ef380b1300a5dc9abf8a463103a324811290692622de974c21b14038a59a63461d92bc390692efc710f603f29f4b9ea77a4bf367bf364deff78c15f923459566e28aec189b05fbd09a2f3c6883edf97b5a778ad8c7ad8a767f6d989c6160b71985e2bb0eeccd01c1eb0bb277d8e741919d6400f647b1f9f50d30440654d3d32ce423751ac6217a2b67af7a0a70f2176", 0x96}, {&(0x7f00000008c0)="a547f64d6ab9fb156d6f159197ccd0f71e57ce8c86777325a5bbd5fbfb19cdf38e09935fc7c3f494d903e07918720d14404407554d5ded3b2a87e9d8dd8441af6cc0cf36672af9a91771cf489b7db4fe10f9b2e914f7d27a64c80638512f0901fbfd07cf55ae584c57810682bd2d37505497e3bc263494321d953144d06b0ffadc4fea2977b2311f762fa83579db2ba426123cb07b0d6fda129b366062440f", 0x9f}, {&(0x7f0000000980)="063e1ebf196f5a4dd6044fadab9bbb8ea9e751727ede301cdd87699eda81a4ecabd992e88f5528946b5c71f8e53f50971d065dd4f70445fc894ca8556bd0bbcbbdc89b645d296cf14f3f6ba1645618b0d2f3a827a4b35afc1674b0800dacbbfcaaf8ad516b5eb1f11b271b4dbcc172941af5431f895bbe0ca8311203e181070d280215b0cab6a83f6c4c9c89b44afd1c58062282412127c44379f0d922d3a4f2844aee5f2c5eed18ddfcea1d4bf6cd304e1fbc4466dd3fa61e56f4d772a75c58e8d2a5", 0xc3}, {&(0x7f0000000a80)="464d6ee0e8357a075e49fe1d05899f6ec8988663e8f7e4971a872a346f3be82b07f7e8cab131730f94319b1aa57d41874dd9311dd9bf6d6c5c3f301cd1d61e28b4afa84c9f2146fd3d11f7ff11e08e5ab61f74011c17100f18ac3da94fe7bf4f88cc85d9165d1f8bb2af4a75858a8cf36562c7b46d9bff77a17e8191c879e8fb8f9fa2bdae81802f6124f9b939abc59d5261ab3ab610609ad2", 0x99}, {&(0x7f0000000b40)="f221e904468f566ce3d82fce366c5b6802504532e6f0d1b2dcc2c6694eed6dc15d3af91221d4171aca702f916fd3dd4521c56bf13337b4866573cac3ae783cf756f68782877401764733117380060a26006856cc05fc3a54502bbdf03ec37db9d9b75ad44d5537b623c5ce91fe2be46f49191b72541b4869fab5280910f2a8c6e0f91e7872a8129fd5f60b25db22dc78915d7712b2f1d0c54ef3e1e0d0636802459e2658f91c22cd9b8ebd7d650f2945", 0xb0}, {&(0x7f0000000440)="83f1bae8fa7ca82342fb45e14cad692ce6dcbda2322e546864a6fc6963dee41adde5ba1055442558fcda9cd9c228b7aa03220d974190983f268add2ffc9f3853fb96c5ff0502bd66d6f367621878531a1f", 0x51}], 0x7}}, {{&(0x7f0000000c80)=@rc={0x1f, @any, 0x1}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="2317bf0bbd5ad4bae246ed5191a56dc6524c42abc10217016bf3cb96543e3f0e", 0x20}], 0x1, &(0x7f0000001e00)=[{0x90, 0x110, 0x0, "eed8e282762027c9cae274816ce51ffaaae17e9de9b2f754dfcd702affb8786cc608be202356a20ced2f8558b9c1d8621318e0f58749b90547d69e272dfa1f13cfc3b1c167e5f3af00262568f8cb48221b453cb6210278f8c9b0185f6dcad7bebb642b90edbbe39ae9ae101e832447ab7c66fe177317a40e3619d54ee1ce"}, {0x98, 0x6, 0x1002, "8bfa63e7d64dd8f47e62218a2912eb82ebd130d89fc60f21d5cd84c287b835ec2d75b67e3f693ef7dd542b7100fd059b65bafa00d3bd6007aa3f129e2648bba4e7ea6674f807aed13f5f2a8212f871c3c86625424ee2c088e6a5fd2d1d2b480c830458cb78de850bd08e06b9deab39a39682fdbc447f50cddeb068cf41f065a20e"}, {0xd0, 0xff, 0x7, "2c3087649cee89325e0609fff070d50acc8b26231639cb9b0108bd9eadf88fd3001968763b1cf31a16fbd27535ecf71051bae897b7aa7b6c4fbf8b0402fa6547cc59bd72af9f62604fc1d0a5a2ba3e2c6935896c49b722866d322e8bc16165e43ee6a08a27728ed75cdca180c9bb36cd97dd739f3444babd2be7565290b319c8958658ffc07434c044e0f5c64b9d9101f6803537c7a5c849c13616d8c212a593d3b66898064f9578fc1d65c13814ff21c700bd7a6baa8e000da42541"}, {0x1010, 0x3a, 0x0, "c93714de25ed8a8fe19159d67a5d18bf31c9032668c0a542f7fb4253752723a95cc7808222e2a71968cf96521dd1c381c57f9cf4977ae793ddb66a8da7c65809716f5f2a3e8e066a9f88a48fdba38d18e1f056d006231f1488941589e5fbdef880b9e593ad2a65ff45d27fc21b7f78a710beb06b3a1183e00eb77f87fbd3f4e447f416cdae63e78571856e96239fe7310b47804a6cb1243fa3f124be1557dc74b7dafedaf83649e285bb864bd4d010802c4fb0bff0b960bf4280879c244a3e5c72b4dc3eb71a03511bffbc44877e25296dff0966fc3b0302be947aef4ae64f2712922180f17b04530060776da017a924d2bac0a799cbc04f8717c6d536d750ba8c5d3bede1bd11b05d636984f7cb16b14cb00d62b61a6becb06cbb6bc2fd49e9ef0a69c9368a9573c7b982fa8961559960db06e9c11abffc44d9cf9458b9367e7bc65359559f2527a57cdcb3484cad4270e56766d810ce6695219b9d009f6cf43d233f39918f0ac512b5b141d2f27fe3504b31c318b9faf306ffb02afcbe15fba4cc032fbc08f03449def86fed9ee24aca1d1885eaef9d75429eb6f6fac08d71636a4e89495d22f94a6f7c4be12c90a808b9e2bb79a62fd9b586d4efc210ec039a434a823425a658cf943b7033dcf4b9c9c1746843b9156999e85879b7361d8789bcc1d90c9ff5422f28ca045b939d72ad80c44f0cb3dc69373f4717f8c88a37fc2f9762286387f71d1ff43a746b1b0b77b745923f72712a79f2e9c284b73f4a719091032802b7fdeea7ecf0a389a21133b1417fa2f99d3b069b70eb938fb1eb125cf96babf92ebf1e0cd98c0ec464c57f896b799aa761b86134c4263eff36777984c38d5362a0aff8eef815fa195f9ebe414aa7f937d201c154092768f59cdcaad1ce54a5c0d262c29d52cdfbc040db7b40c19aaaa39bceeab46ba03645a753ba2a475614f15a3cfee62d919a88d86e62b93a55ac6972aa8e5ff86246bf241161ed4c90e6dea575ab3548ef6e3ab7fdc14aae8594b806b50f4e1b364327c03baee08f22cb2b3f86ef077e7c199f6729cf09072d8b30df983353e6df5b3708554cab5abd8656956125be8a1be70848b687adef871c8822ca77a4bc1984b3c78ebf54f6fcac43c48c2a35377041a9e1ac4a7af78d3f2b047591689636d6f3b0b4a3543232faa74c9d9b7d0910023db484a5d20493376c49b6d6e4e110645f7ef023ba764c36ac58be1bcbb8bbf155b0832787e67aa7bf4f501bb35aba1243024fa9270b81328eaa9abb444f9288be8ffcb7b0bb8f6e65bd173c9231aa86323fbca2ce9a173acfcb414ac768b4ece388173922902067e257ef5e99842e31077c1692a1f2cbe5b72f84603fa0ca54c5a3755d93b16549e0d1ac745b5f45ae84365bcac57a6b8d84ed4f9308be08d425728b59c665791269a08124a5fe793ca710cb931e93508aae292908af9ec70becdf100e2e67d363b52f4be8faad4c2bd40be3f9d22f23adc3e1f25eb214eff5786c904f34bc39b6c2ac5d7582afeea75f316a690b54032c356e339d5b6df1ca74655e3468a43ee6d71084dce39501d88c74b0b43d352cf6be6466d5cb1f567b7f6af5a8684db5bea8d7d1b0058d3d7331a02214b88b0e7d5ebc3df808a3fe44b4543501eaa7ae7acfcab1352b2fe2223aa9a258b11c67899c24db23161e406feaf8be450d4835be9b872c750eeea6b4235b029cfdafe48207924fde56ae7e4791a53b57dd48ec02b7b9f0d9696609c0f1a14d472be757261c439449c7295b05ef60b19c8b60240f2952d804fea9f44e7c792cb5a01c7a6a6ca59e675237980115157285cd733fbafc59b7880011e58730fd40fe5bbf4db2092bda8030ea1c87e3d2cd2da857c4dcb378f0417ae95717b5b41b70de578865f5499c64f4ffc88d0f8800747039df340bcea187843bc828d3c9b20a8f252a947b39364367fe7d0a2143fb5da3c551b41988dc0b91e4a309420d2a4a9e64faf882350107e776cfe654ddea9d0b46cb3a81d44ea68e3f7af1f569f88a331da155c76c652e3f3b321fd6be4f755c4453d3d253fbc00526839feddb1b78bc597fe21659a3f72ecae0fc65a6828a827756a3d257ae023810c0c249e04f62625e7b7bac51743428fcefc750ed59fd02bb56bde3347f267a71af8d44ac028037a29af4da6b9da06cb396d8d794b24e45c1845dc15b0338ec80699f7e2ba813789958f7e981b9f729cb66aa2aa65ad4b0c0092e84b59f36e07699a1bd3f9c92a813e549ca030bf9ff83be7d8a410de1d65869f105766d41636d3b709edb1b1e07c0c38d5e35d651254b47b508e4d7e1716389e0c3c62130f0b42a5216043ccd8dc67214950be78f1f81da1c76d35d5e06d81abca5dfaa84b7d61e2e17bf46f5f20f7300a9b572a913800aee57539d602e710379654b4949c44114be9487728caa883b12383928c6df5ba10309e38383c5711827b9e80aa9856b3d119c87ba3b1691f4b5600f4fb6a6365575177fe1390910d94a455e87a0640b1e2971f2460a196945f3e2be589545bae19a8603f10fc86c61357c06e1ac8e1267b933d930affe29438bf011395ae66bc7fa45b983855c649b10b0d95a235e338c574c77ed86bb08e6257118ff675f3b7c88016edb28f2cd220e9ca2070aa2f4d23af6b6f6aefe51c2d597a4dec079fb6f50861060e892477ac0e616bdd6630bd378b349e332a0bf16930b9e47521a0d3c0e24e331e52552a3268c864c6178779990d091443cb58f3d100541449e8380642db61833b62ed1447fce4a3df6e5dca9ddb8095d2d8658067eb29c8fb147414b350290e51551fb3d549a1444baab8265e311332d21e8c06a9a5cbbf0f21f545291ef8725c682e1cc7689aeb6def621284ade0f0a1556ab65a0b7ab8dc6db962bf4e8c068a24f6d3d1746dd7e5dbcc859ce75a17cad69474e778f20fe10766f0fcd5fb664b32755cd15e39e14726ba72d11da941ce6e4d7df4861250e831f4efbdd45a675ef4212c5c959f13e79d90fc9c13403ef13ca8dc1fc7a394373be39cda9cfa9053c6f82af84319bddca40e29bee7b2e24d881eb3e6342a00de7a2c9b6fd1e0d1d93f3a9ed9a49abd527c8b3aef94dc076daf80a9b6d2998804ce537f523d1dd721a941f8043867383a70bbff00208d1373b77f25fa2b4a49c63422d92b1c18feacf911039c945d4cc7f66729461393e5e72dcc40fd35f82a3633c859edcb76e9134fa037c0f7a063fa7c93d826a50367c17d6f6e1762cfb58c95e0010809e7c7038865a24cbec01f45107f055bf7b5a4c122b8a7f75516fa45eb95dcb62b1f924421f816e085f9ac9847cb480ab551af27a451c0a2d253355baa9c01d4591bcce25f6bd2225a6e8c5728e3d776cd08bb18f598706a788b1878434baa94fc42613b77f2cc23e035be6d28626f2018300580366b30d9f956bf5c33508dce1a8ffb4803d1dfbef3d9cc36c1a2f2102750b94d99bdace5fb348123563443cb06829e869a71b19371031a32340b772ebdac78b706c56f418e86433fca37b0f761369bac982f2b346b8727bff6e15a545faa4c28b8ea7a344688d26e68da280b8456b2483c580ea9c5aace41bdbd5156f6dfbaa47c337138150bfa4c3282d6b388284ecabe91a75afc069f23da607ddc88afbaaf6918cd9d7677bb23c935225575061709e0d69de1a89952a4fe11f41dc96de1b0d02891ccac4508ce8d8ce466f327ae0755b129294dcdb114bdcd20bfc559bd124d15c5ed9d033afa109b9325f2c382e00fd979f4d85070f434c8e881ff140d47cffcea3525e016c5d4195f352b7e7b4805833c9f13da9de606b631ab775c4e598581d655c154c20e3ba160c67a8ebfbd6eb61a42851f2c2eb442d0570b3583cb3f66918937154a4615c0d604195df03faf31bda26b3c52f74de3f698ba537413cb4c156f5e7c65a1ec92413c3531738b6347c41ecef3eb5ef9a3b9cce78bb451d8d61ee1435daf8c952d0f8e64ce0163e66447b99f5d367b082192f740ab9bf649e48bd2a545dcc346b39b99f5775ca3b06ca561eab34fb18ae27b45f96aed44d631d3d3e9c2cf967d580fbf84a271215107e9897d103f855265b3896a6af92b66b3c88bf9034a5704bec53a978c5d4587ff6284bdac585b6915e79aeba794a598a7c0df0bc2965c8a118f139191682f3fd6dd703ec2786e811c141486caa61f99c6361ee249364872189a9ab7443eadc567a420c45dabeae203282ddf25a7a555df2082ddad876f6a5ee7dca97c70fbcdfb9a81bef57262b874e0ee341ede36aad01ba7091a988657dbb20128a59b87f59b0b19392aa33754deb2688cfe7f0d49003dbf43402731833d6eb05f76125ed38a698fe46d8fe3980c4bcd3aed75182955b5c63fe29d00a2c928f42ddc4834256518f769ccf5c3a4a107eb3441a0059e2a90fbfacd11b88bb2fe0f9caba3199cd4eba98ea8048d43cebef68f3f56fd64d2300e95676c720839194bb1b925b7bd1e0ec492882724c7829b4dda523bc66e558cd90c78d011809b7b5c90f2b1858c369969785e77947e8e2f487183423847d1a389b5379105fb6573174c34d1fbc0c2ef73dca36de415a2c85fe464568bb38b5541340f47cc7685292ae15215a77ecfc3f8d34ea1cc3852e0e6e0a6b430e8a830c061d5bb567c07aa0c6caf66e3c9d76f2f81a6f09f4c8977396d66ff2109cbf0cc6dfb28eee8b5a52cf74cbbedc35352c2de6f6edb74639479f5d33141c57513a0a53eb395a46e00651b2b2d2449d708110282d9dae49961e357a1f013804ac47763cf6ee255f5dd4d1cb7cd035d52496fffd61c1b5c457fd59b510d7bffabb63ef73e3499ba435d23b490933d61ac8bcf5bdbd274a39b2059f75daf7f9c48e0a40a6f5b7dd8531c80c536f5ec2303b7779c4c3a5b040bd164b77e3787b7600a833c37e4e4ec7e3db3faf2b4a330216b10a9f4ccf36baefeed82355048af994ee877170a7292dadd5fec31b9ee7b261012ed8c5aa0e26e1014d28607ae5f4faecfbb79ab3bedb776727848c5f417c6286f82ea343c62902c30d712cf00a9ffe65178b7ff72a7d7142e7d9c14b498bdfcc52a19e60ae200d384529ef201bce3e6206065ded93a6c304df666ceff4d5ff6d29627916c1a855c4483f961c7f4658e013b9b1921a6a6aa8a88f329e5be8b540d921706b3c1086e6a4b9bc516138b119ca01707af48cb05cf4badafe106693baa9c8711cc960610880139a8cc931772bba1e8dc853dcc9f5e264f81d4e4b5304a710023001ee04e40d2754c9416c40fb234be04c61df20b7e005a97d45c9319993b40c528b3ab64bcf341f01985603000880666c52c74faa096b7fd1d56be6dd160ae4bc1f53e28b7a218081833f80f2c9bbdadeb4c5dbaa107840b83e4f8b9171e330e19ba1cffe7f5ca811dc5bb5fdda723e03fa1e5b76865a91e9fc39973c304d69c05256036f892d427d84ffe0f20c461d66c801b3bc4d6684670d180dcb96f0232073c1b4320e4aaa7b7a77e1068b8417e1d73b491c8e3eadd2baf63850fa83c2a55bb1dd007f1881433a1bf57b208baf5ef79663565a6f7798869764deffc1ef28c02ed450b928cff65561a09d0d9401cb63aa66b2bb32e5df2a39b38753e8bc3c12eafaff6f02653121fb92ca419dff288f5ec2d5b08af8899e65033ff8840c9511b8dd796cf1dd6977012c210c76fda7f7c10cf295d968f51c6013f8bdc5a7b0a605cdee20e4627995647627840cc1c141501cefdfea7f42b2bfb6f9b78c618a1e71dc2722f3f1bb"}], 0x1208}}], 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 22:18:51 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x0, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:18:51 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x643) [ 1849.557558] cgroup2: Unknown parameter '#¿ ½ZÔºâFíQ‘¥mÆRLB«ÁkóË–T>?' 22:18:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x152) syz_io_uring_submit(r0, 0x0, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x2, 0x0, 0xffffffffffffffff, 0x0, r2}, 0x2) copy_file_range(r2, 0x0, r1, 0x0, 0x10001, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r3, 0x3) sendfile(r1, r3, 0x0, 0x20d315) 22:18:51 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x643) 22:18:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 3) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1849.716100] FAULT_INJECTION: forcing a failure. [ 1849.716100] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1849.717542] CPU: 0 PID: 9814 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1849.718310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1849.719243] Call Trace: [ 1849.719554] dump_stack+0x107/0x167 [ 1849.719961] should_fail.cold+0x5/0xa [ 1849.720400] _copy_from_user+0x2e/0x1b0 [ 1849.720849] iovec_from_user+0x141/0x400 [ 1849.721301] __import_iovec+0x67/0x590 [ 1849.721735] import_iovec+0x83/0xb0 [ 1849.722130] vfs_readv+0xbb/0x160 [ 1849.722507] ? vfs_iter_read+0xa0/0xa0 [ 1849.722926] ? __fget_files+0x2cf/0x520 [ 1849.723363] ? lock_downgrade+0x6d0/0x6d0 [ 1849.723806] ? find_held_lock+0x2c/0x110 [ 1849.724245] ? ksys_write+0x12d/0x260 [ 1849.724655] ? __fget_files+0x2f8/0x520 [ 1849.725091] ? __fget_light+0xea/0x290 [ 1849.725515] do_readv+0x139/0x300 [ 1849.725896] ? vfs_readv+0x160/0x160 [ 1849.726309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1849.726877] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1849.727449] do_syscall_64+0x33/0x40 [ 1849.727848] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1849.728394] RIP: 0033:0x7f313bf62b19 [ 1849.728796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1849.730763] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1849.731602] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1849.732375] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1849.733139] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1849.733902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1849.734667] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:07 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x0, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:07 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:07 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x0, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:07 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 4) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:19:07 executing program 2: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_io_uring_setup(0x4ee5, &(0x7f0000000240)={0x0, 0x806cad, 0x0, 0x40000, 0x1b0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000180)=0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000380), 0x6e, &(0x7f0000001900)=[{&(0x7f0000000500)=""/86, 0x56}, {&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/165, 0xa5}, {&(0x7f00000006c0)=""/143, 0x8f}, {&(0x7f00000000c0)=""/44, 0x2c}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001880)=""/68, 0x44}], 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="2000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff], 0x20}, 0x10002) r5 = syz_open_dev$vcsa(&(0x7f00000019c0), 0x7, 0x26100) r6 = dup(0xffffffffffffffff) ioctl$sock_bt_hci(r6, 0x400448cb, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000001a00)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x2160}, 0x0) r7 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40242, 0x30) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000300)={'sit0\x00', 0x0, 0x2f, 0x6, 0x8, 0x40, 0x164afeee9b0ee089, @dev={0xfe, 0x80, '\x00', 0x24}, @mcast1, 0x20, 0x1, 0x3ff, 0x800}}) readahead(r7, 0xffffffff80000001, 0x5) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r8 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r8, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x58ab, 0xb305, 0x0, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x10841, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f0000000200)) 22:19:07 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0xe2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x80) syz_emit_ethernet(0xc8, &(0x7f0000000500)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@ipv4={0x800, @igmp={{0x22, 0x4, 0x1, 0x0, 0xba, 0x68, 0x0, 0x6, 0x2, 0x0, @empty, @dev={0xac, 0x14, 0x14, 0x22}, {[@timestamp_addr={0x44, 0x2c, 0x18, 0x1, 0xd, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@private=0xa010100, 0x609}, {@remote, 0x2}, {@local, 0x101}, {@multicast1, 0x2}]}, @noop, @rr={0x7, 0x27, 0xb3, [@dev={0xac, 0x14, 0x14, 0x1f}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010101, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @local, @loopback]}, @noop, @lsrr={0x83, 0x1f, 0xb, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @multicast2, @empty, @loopback, @empty]}]}}, {0x1e, 0xf2, 0x0, @loopback, "040ca39d8d009b21ec1a1aa149e53745937c03f59e2d377eac99d409731639043090b37738124e4b1fb7"}}}}}, &(0x7f0000000280)={0x0, 0x1, [0x8ec, 0x1fd, 0x525]}) 22:19:07 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:07 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1865.953785] FAULT_INJECTION: forcing a failure. [ 1865.953785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1865.956974] CPU: 0 PID: 9833 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1865.958417] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1865.960192] Call Trace: [ 1865.960780] dump_stack+0x107/0x167 [ 1865.961544] should_fail.cold+0x5/0xa [ 1865.962345] _copy_to_iter+0x264/0x12d0 [ 1865.963183] ? __lock_acquire+0x1657/0x5b00 [ 1865.964108] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1865.965135] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1865.966198] ? check_stack_object+0x6e/0xb0 [ 1865.967105] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1865.968188] ? __check_object_size+0xae/0x440 [ 1865.969128] tty_read+0x29a/0x5e0 [ 1865.969854] ? do_SAK+0x70/0x70 [ 1865.970563] do_iter_readv_writev+0x57c/0x750 [ 1865.971507] ? new_sync_write+0x660/0x660 [ 1865.972385] ? avc_policy_seqno+0x9/0x70 [ 1865.973227] ? fsnotify_perm.part.0+0x22d/0x620 [ 1865.974193] ? security_file_permission+0xb1/0xe0 [ 1865.975218] do_iter_read+0x301/0x760 [ 1865.976030] ? import_iovec+0x83/0xb0 [ 1865.976831] vfs_readv+0xe5/0x160 [ 1865.977553] ? vfs_iter_read+0xa0/0xa0 [ 1865.978362] ? __fget_files+0x2cf/0x520 [ 1865.979219] ? lock_downgrade+0x6d0/0x6d0 [ 1865.980093] ? find_held_lock+0x2c/0x110 [ 1865.980962] ? ksys_write+0x12d/0x260 [ 1865.981757] ? __fget_files+0x2f8/0x520 [ 1865.982889] ? __fget_light+0xea/0x290 [ 1865.983718] do_readv+0x139/0x300 [ 1865.984451] ? vfs_readv+0x160/0x160 [ 1865.985237] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1865.986334] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1865.987411] do_syscall_64+0x33/0x40 [ 1865.988192] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1865.989262] RIP: 0033:0x7f313bf62b19 [ 1865.990040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1865.993883] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1865.995461] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1865.996953] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1865.998431] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1865.999930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1866.001420] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:07 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:21 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x81}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000000280)="ed61000000100000dbbe34ffce2ab8de9e810935655fdcf4651fdc", 0x1b, 0x4200}], 0x0, &(0x7f00000001c0)={[{@errors_continue}, {@i_version}]}) mount(&(0x7f00000000c0)=@sg0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='cifs\x00', 0x182010, &(0x7f0000000180)='ext4\x00') r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hci(r1, 0x400448cb, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x2) 22:19:21 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:21 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x0, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x0, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 5) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:19:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x0, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:21 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) [ 1879.588435] loop0: detected capacity change from 0 to 262144 [ 1879.603532] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 1879.614464] FAULT_INJECTION: forcing a failure. [ 1879.614464] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1879.617580] CPU: 0 PID: 9858 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1879.619002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1879.620745] Call Trace: [ 1879.621305] dump_stack+0x107/0x167 [ 1879.622070] should_fail.cold+0x5/0xa [ 1879.622860] ? should_fail+0x2/0x5a0 [ 1879.623639] __alloc_pages_nodemask+0x182/0x600 [ 1879.624623] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1879.625886] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1879.626975] ? lock_downgrade+0x6d0/0x6d0 [ 1879.627867] ? mark_held_locks+0x9e/0xe0 [ 1879.628728] alloc_pages_vma+0xbb/0x410 [ 1879.629567] handle_mm_fault+0x152f/0x3500 [ 1879.630460] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1879.631556] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1879.632703] ? trace_hardirqs_on+0x5b/0x180 [ 1879.633605] ? __pmd_alloc+0x630/0x630 [ 1879.634425] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1879.635571] ? find_vma+0x7d/0x180 [ 1879.636336] ? vmacache_update+0xce/0x140 [ 1879.637213] do_user_addr_fault+0x56e/0xc60 [ 1879.638129] exc_page_fault+0xa2/0x1a0 [ 1879.638950] asm_exc_page_fault+0x1e/0x30 [ 1879.639826] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1879.640965] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 83 4b 1d 02 0f 1f 00 0f 01 [ 1879.644808] RSP: 0018:ffff88804742f8c8 EFLAGS: 00050246 [ 1879.645914] RAX: 0000000000000001 RBX: 0000000000000040 RCX: 0000000000000008 [ 1879.647396] RDX: 0000000000000000 RSI: ffff88804742fac8 RDI: 0000000020002340 [ 1879.648921] RBP: 0000000020002340 R08: 0000000000000000 R09: ffff88804742fb07 [ 1879.650415] R10: ffffed1008e85f60 R11: 0000000000000001 R12: ffff88804742fac8 [ 1879.651912] R13: 0000000020002380 R14: 00007ffffffff000 R15: 0000000000000000 [ 1879.653442] copyout.part.0+0x10b/0x140 [ 1879.654286] _copy_to_iter+0x293/0x12d0 [ 1879.655137] ? check_stack_object+0x6e/0xb0 [ 1879.656058] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1879.657086] ? check_stack_object+0x6e/0xb0 [ 1879.657990] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1879.659072] ? __check_object_size+0xae/0x440 [ 1879.660021] tty_read+0x29a/0x5e0 [ 1879.660757] ? do_SAK+0x70/0x70 [ 1879.661477] do_iter_readv_writev+0x57c/0x750 [ 1879.662414] ? new_sync_write+0x660/0x660 [ 1879.663277] ? avc_policy_seqno+0x9/0x70 [ 1879.664144] ? fsnotify_perm.part.0+0x22d/0x620 [ 1879.665334] ? security_file_permission+0xb1/0xe0 [ 1879.666368] do_iter_read+0x301/0x760 [ 1879.667349] ? import_iovec+0x83/0xb0 [ 1879.668186] vfs_readv+0xe5/0x160 [ 1879.669075] ? vfs_iter_read+0xa0/0xa0 [ 1879.669898] ? __fget_files+0x2cf/0x520 [ 1879.670747] ? lock_downgrade+0x6d0/0x6d0 [ 1879.671620] ? find_held_lock+0x2c/0x110 [ 1879.672504] ? ksys_write+0x12d/0x260 [ 1879.673317] ? __fget_files+0x2f8/0x520 [ 1879.674171] ? __fget_light+0xea/0x290 [ 1879.675020] do_readv+0x139/0x300 [ 1879.675774] ? vfs_readv+0x160/0x160 [ 1879.676573] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1879.677689] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1879.678789] do_syscall_64+0x33/0x40 [ 1879.679599] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1879.680696] RIP: 0033:0x7f313bf62b19 [ 1879.681469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1879.685332] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1879.686915] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1879.688414] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1879.689914] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1879.691406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1879.692903] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 6) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:19:21 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) [ 1879.858723] FAULT_INJECTION: forcing a failure. [ 1879.858723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1879.861459] CPU: 1 PID: 9868 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1879.862905] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1879.864642] Call Trace: [ 1879.865215] dump_stack+0x107/0x167 [ 1879.866021] should_fail.cold+0x5/0xa [ 1879.866839] _copy_to_iter+0x264/0x12d0 [ 1879.867712] ? __lock_acquire+0x1657/0x5b00 [ 1879.868619] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1879.869636] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1879.870709] ? check_stack_object+0x6e/0xb0 [ 1879.871631] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1879.872723] ? __check_object_size+0xae/0x440 [ 1879.873685] tty_read+0x29a/0x5e0 [ 1879.874419] ? do_SAK+0x70/0x70 [ 1879.875146] do_iter_readv_writev+0x57c/0x750 [ 1879.876111] ? new_sync_write+0x660/0x660 [ 1879.876990] ? avc_policy_seqno+0x9/0x70 [ 1879.877857] ? fsnotify_perm.part.0+0x22d/0x620 [ 1879.878842] ? security_file_permission+0xb1/0xe0 [ 1879.879862] do_iter_read+0x301/0x760 [ 1879.880690] ? import_iovec+0x83/0xb0 [ 1879.881509] vfs_readv+0xe5/0x160 [ 1879.882247] ? vfs_iter_read+0xa0/0xa0 [ 1879.883076] ? __fget_files+0x2cf/0x520 [ 1879.883916] ? lock_downgrade+0x6d0/0x6d0 [ 1879.884780] ? find_held_lock+0x2c/0x110 [ 1879.885650] ? ksys_write+0x12d/0x260 [ 1879.886452] ? __fget_files+0x2f8/0x520 [ 1879.887282] ? __fget_light+0xea/0x290 [ 1879.888123] do_readv+0x139/0x300 [ 1879.888862] ? vfs_readv+0x160/0x160 [ 1879.889655] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1879.890757] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1879.891846] do_syscall_64+0x33/0x40 [ 1879.892628] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1879.893684] RIP: 0033:0x7f313bf62b19 [ 1879.894478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1879.898315] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1879.899910] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1879.901377] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1879.902864] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1879.904359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1879.905849] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:21 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:21 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:21 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x0, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:21 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 7) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:19:21 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x0, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1880.211785] FAULT_INJECTION: forcing a failure. [ 1880.211785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1880.214500] CPU: 0 PID: 9881 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1880.215884] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1880.217540] Call Trace: [ 1880.218071] dump_stack+0x107/0x167 [ 1880.218797] should_fail.cold+0x5/0xa [ 1880.219573] _copy_to_iter+0x264/0x12d0 [ 1880.220390] ? __lock_acquire+0x1657/0x5b00 [ 1880.221280] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1880.222275] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1880.223294] ? check_stack_object+0x6e/0xb0 [ 1880.224169] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1880.225211] ? __check_object_size+0xae/0x440 [ 1880.226116] tty_read+0x29a/0x5e0 [ 1880.226824] ? do_SAK+0x70/0x70 [ 1880.227511] do_iter_readv_writev+0x57c/0x750 [ 1880.228419] ? new_sync_write+0x660/0x660 [ 1880.229242] ? avc_policy_seqno+0x9/0x70 [ 1880.230046] ? fsnotify_perm.part.0+0x22d/0x620 [ 1880.230976] ? security_file_permission+0xb1/0xe0 [ 1880.231954] do_iter_read+0x301/0x760 [ 1880.232716] ? import_iovec+0x83/0xb0 [ 1880.233487] vfs_readv+0xe5/0x160 [ 1880.234177] ? vfs_iter_read+0xa0/0xa0 [ 1880.234948] ? __fget_files+0x2cf/0x520 [ 1880.235741] ? lock_downgrade+0x6d0/0x6d0 [ 1880.236551] ? find_held_lock+0x2c/0x110 [ 1880.237364] ? ksys_write+0x12d/0x260 [ 1880.238127] ? __fget_files+0x2f8/0x520 [ 1880.238927] ? __fget_light+0xea/0x290 [ 1880.239707] do_readv+0x139/0x300 [ 1880.240412] ? vfs_readv+0x160/0x160 [ 1880.241169] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1880.242234] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1880.243276] do_syscall_64+0x33/0x40 [ 1880.244032] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1880.245049] RIP: 0033:0x7f313bf62b19 [ 1880.245778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1880.249402] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1880.250901] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1880.252315] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1880.253721] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1880.255122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1880.256519] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 [ 1880.416728] loop0: detected capacity change from 0 to 262144 [ 1880.421427] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 22:19:33 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:33 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 8) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:19:33 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) 22:19:33 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00000003c0)={[0x4]}, 0x8) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) dup3(r2, r1, 0x80000) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) io_submit(0x0, 0x3, &(0x7f0000000500)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0xfb76, 0xffffffffffffffff, &(0x7f0000000000)="8ed0ff636f0c003ddf2d874c306213be30e4fe21f191ec", 0x17, 0x3, 0x0, 0x2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x3, 0x7ff, 0xffffffffffffffff, &(0x7f00000000c0)="24f2a6bfca5c466aff0bc4295eb8d556cb2d1be262a22b68db91d962688e7e6932f3bc16102ef1e70c42bd183f522819b6a6a64c6c2e74c4e586f8a01af944b0e6106e3b2e13fc5b4268ca5eac7ee70b3a27de40215a4c62b042ca10a97d8e40d7be33d4ee7165cd8ad4840f62acd1d5bd369e0c012d4cdd005e386389c6bc131f45c68de684485f60f402b0b3fd95d4f591490bca6526197ab133c4537b4fe2a6bfe8d2e9ee2f9ad13d3c208efe99374714bcd3d341c9fafdf42fc7d5", 0xbd, 0x0, 0x0, 0x1, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x4, 0xffffffffffffffff, &(0x7f0000000a00)="f6a31cb570acf231176d46e0081b206b56bc2b0eb51901a3860f84e0d9413b3886848afd08027a717e24fe88b8aeeb0372f51761c80cc6a6a72dab34487e0a8e29a8766c1cc3c4", 0x47, 0x401, 0x0, 0x1}]) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x2c, 0xb5, 0x7f, 0x7, 0xffffffff, 0x2, 0x6, 0x4, 0xf5, 0x40, 0xc8, 0x8, 0x99c, 0x38, 0x2, 0x4, 0xabe1, 0x8}, [{0x60000000, 0x1000, 0xffffffffffffff81, 0xffff, 0x9, 0x3, 0x7f, 0xfffffffffffffbff}], "2095b12e174380ce64ee408b8e312cd6191ac98a65637e19258992acb34afea496573bd3b2755e52269cf67090b3d88cc52c29865947a9317f8838ee8d1d74f3a9030b309ec70fef39cc1f04128912d7ccf83b662359f3aec91df46aae420327c4d1e65d904031f1015516ecd0e18e2695bb99514b3ee011a3b7c0db599692f5dc686523472a93354655", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x702) ioctl$TIOCSLCKTRMIOS(r3, 0x560f, &(0x7f0000000040)) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r4, 0x0, 0x0, &(0x7f0000000080), 0x4) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = syz_open_dev$mouse(&(0x7f0000000540), 0x0, 0x40001) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r6, 0x0, 0x0, &(0x7f0000000080), 0x4) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x440600, 0x0) sendmsg$nl_generic(r5, &(0x7f00000009c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000980)={&(0x7f0000000600)={0x348, 0x3a, 0x300, 0x70bd2c, 0x25dfdbfd, {0x1b}, [@nested={0x332, 0x76, 0x0, 0x1, [@generic="84d301eb1d9665b8f1a0506d2705245f6324fb27e146fd9b5b5c08cba565c8964e6e692195fbb2a3c075808f8c211808ff528f80dc7059f8d5da4574a3eac1013874aacb3191782505e98d243ed24e62b2ace352fe212067aa515b3b4dca4874e2cac1b8028c8a22a693c6f321340a4b34003d08e3514f8f5ee2fffe80fc7ec1f8b18110592ba6374c6ac06f7595392e2619abc8fc550a8e4cf88a8bd6f965768cc98fab598f0123ac185ffcb998e00f58dc840721dba57de53eccd0a4bb604bdfce8ccc3bf5365fc9b75b55a4de29bddae547887a06c2c8517078ae7ed7583e1a", @generic="56ad4936b54a99016bac08438c", @generic="8a6bed975e6f047f36305831307978a84be560eb35fcc9f90fd509b36a74555d96a202263ef11205af69f4b33d5bdedb83b30e4c90ad5856768f2afc9484571339b97b6daa68c971d8f336d44526ded431d1be7626c782f2cc408291581651924762bb38a9fa58ac3d2044107ae01fdbfe2f5d219a13af20cedf98032a0f263ab9a74030440eebc783a41703c356fa665ab61691e53bdc8bc34b04b89023aeb567d9acd087f4a0363532b3302336e84f060222fc672385dbf53dce99508b5fc40ddc2c5f53cfba47ed1362", @typed={0x8, 0x28, 0x0, 0x0, @fd=r6}, @generic="5d7e69f6a4bac3e039a84db88c47d3fe69b1d6af74a0f13977661e29ed537cf8ea4d8d15b1dd4d48e0a7767bdaba7fd854f2eaac209912d858dfea1d09b988629d239ef8ed61e1af903629faa61aa95d3ad080280c86893654bb1e3dab2a120e82250401e4ef297e6cce44e639a989fa89e4811f2770ada803563f2acc36423ed2d49e17b736b4224123a2283b1c7763f0f0280eba6b9e8a175dfe94ba7ca1d610e8ec1c99", @typed={0x8, 0x58, 0x0, 0x0, @fd=r7}, @generic="fba5c80c5e3025fa8d5e21415484296b93e763614e8521a81ddda99f7a22f7777a6908402ba13d2e93b60599ac1ad7b8b0bd51ee648442fbc51dc441ef572e49711fd0e88954c72049a80b0638d9419dfa90af4eec6b679c37e31a41000904442cecec82f2be31828927e381e6f60bc632fcc069b62d87542a3ea69abc869b40172b312ea6358afe3716ff3a431f8308ff83fbc06ae8e4a44e945fbd190b75aa0ede4caafbe0275d0687dd129b69", @generic="4741bf436b23e7bc8c96", @typed={0x8, 0x76, 0x0, 0x0, @u32=0x6}]}]}, 0x348}, 0x1, 0x0, 0x0, 0x8084}, 0x20000802) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x80010, r7, 0x199ba000) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1a1040, 0xa0) 22:19:33 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x0, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1892.015619] FAULT_INJECTION: forcing a failure. [ 1892.015619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1892.018608] CPU: 0 PID: 9897 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1892.020094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1892.021864] Call Trace: [ 1892.022445] dump_stack+0x107/0x167 [ 1892.023231] should_fail.cold+0x5/0xa [ 1892.024065] _copy_to_iter+0x264/0x12d0 [ 1892.024923] ? __lock_acquire+0x1657/0x5b00 [ 1892.025847] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1892.026890] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1892.027985] ? check_stack_object+0x6e/0xb0 [ 1892.028905] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1892.030005] ? __check_object_size+0xae/0x440 [ 1892.030969] tty_read+0x29a/0x5e0 [ 1892.031723] ? do_SAK+0x70/0x70 [ 1892.032476] do_iter_readv_writev+0x57c/0x750 [ 1892.033449] ? new_sync_write+0x660/0x660 [ 1892.034320] ? avc_policy_seqno+0x9/0x70 [ 1892.035170] ? fsnotify_perm.part.0+0x22d/0x620 [ 1892.036138] ? security_file_permission+0xb1/0xe0 [ 1892.037162] do_iter_read+0x301/0x760 [ 1892.038011] vfs_readv+0xe5/0x160 [ 1892.038735] ? vfs_iter_read+0xa0/0xa0 [ 1892.039551] ? __fget_files+0x2cf/0x520 [ 1892.040386] ? lock_downgrade+0x6d0/0x6d0 [ 1892.041275] ? find_held_lock+0x2c/0x110 [ 1892.042130] ? ksys_write+0x12d/0x260 [ 1892.042944] ? __fget_files+0x2f8/0x520 [ 1892.043780] ? __fget_light+0xea/0x290 [ 1892.044622] do_readv+0x139/0x300 [ 1892.045362] ? vfs_readv+0x160/0x160 [ 1892.046170] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1892.047257] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1892.048350] do_syscall_64+0x33/0x40 [ 1892.049130] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1892.050218] RIP: 0033:0x7f313bf62b19 [ 1892.051014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1892.054935] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1892.056564] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1892.058083] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1892.059587] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1892.061116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1892.062634] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x28, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x11, 0x0, 0x0, @u64}]}, 0x28}}, 0x0) close_range(r1, r0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40008800}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x78, 0x3, 0x1, 0x801, 0x0, 0x0, {0x1, 0x0, 0xa}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1000}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x8}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0xe2}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x40}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x80, 0x3f}}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000044}, 0x4000800) r2 = perf_event_open(&(0x7f0000000440)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000e00", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf25250000000c00990000000000620000000a00340002020202020200000a00340001010101010100000a000600ffffffffffff00000a00060050505050505000000a000600ffffffffffff0000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) syz_open_dev$tty1(0xc, 0x4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) fcntl$addseals(r2, 0x409, 0x3) clock_gettime(0x4, &(0x7f0000000200)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f00000003c0)=[{{r3, r4/1000+60000}, 0x1f, 0xf4c, 0xbbd}], 0x18) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') unshare(0x48020200) 22:19:33 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) [ 1892.114133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=9914 comm=syz-executor.2 22:19:33 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:33 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 9) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1892.324195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=9921 comm=syz-executor.2 22:19:34 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0x0, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:34 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) [ 1892.402605] FAULT_INJECTION: forcing a failure. [ 1892.402605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1892.404482] CPU: 1 PID: 9923 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1892.405338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1892.406274] Call Trace: [ 1892.406579] dump_stack+0x107/0x167 [ 1892.406997] should_fail.cold+0x5/0xa [ 1892.407436] _copy_to_iter+0x264/0x12d0 [ 1892.407902] ? __lock_acquire+0x1657/0x5b00 [ 1892.408401] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1892.408962] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1892.409540] ? check_stack_object+0x6e/0xb0 22:19:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1892.410162] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1892.410840] ? __check_object_size+0xae/0x440 [ 1892.411373] tty_read+0x29a/0x5e0 [ 1892.411784] ? do_SAK+0x70/0x70 [ 1892.412201] do_iter_readv_writev+0x57c/0x750 [ 1892.412731] ? new_sync_write+0x660/0x660 [ 1892.413214] ? avc_policy_seqno+0x9/0x70 [ 1892.413698] ? fsnotify_perm.part.0+0x22d/0x620 [ 1892.414243] ? security_file_permission+0xb1/0xe0 [ 1892.414824] do_iter_read+0x301/0x760 [ 1892.415282] ? import_iovec+0x83/0xb0 [ 1892.415731] vfs_readv+0xe5/0x160 [ 1892.416144] ? vfs_iter_read+0xa0/0xa0 [ 1892.416602] ? __fget_files+0x2cf/0x520 [ 1892.417072] ? lock_downgrade+0x6d0/0x6d0 [ 1892.417558] ? find_held_lock+0x2c/0x110 [ 1892.418040] ? ksys_write+0x12d/0x260 [ 1892.418490] ? __fget_files+0x2f8/0x520 [ 1892.418959] ? __fget_light+0xea/0x290 [ 1892.419416] do_readv+0x139/0x300 [ 1892.419828] ? vfs_readv+0x160/0x160 [ 1892.420279] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1892.420894] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1892.421507] do_syscall_64+0x33/0x40 [ 1892.421950] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1892.422551] RIP: 0033:0x7f313bf62b19 [ 1892.422992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1892.425164] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1892.426066] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1892.426919] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1892.427763] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1892.428621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1892.429457] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:34 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:34 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x28, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x11, 0x0, 0x0, @u64}]}, 0x28}}, 0x0) close_range(r1, r0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40008800}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x78, 0x3, 0x1, 0x801, 0x0, 0x0, {0x1, 0x0, 0xa}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1000}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x8}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0xe2}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x40}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x80, 0x3f}}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000044}, 0x4000800) r2 = perf_event_open(&(0x7f0000000440)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000e00", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf25250000000c00990000000000620000000a00340002020202020200000a00340001010101010100000a000600ffffffffffff00000a00060050505050505000000a000600ffffffffffff0000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) syz_open_dev$tty1(0xc, 0x4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) fcntl$addseals(r2, 0x409, 0x3) clock_gettime(0x4, &(0x7f0000000200)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f00000003c0)=[{{r3, r4/1000+60000}, 0x1f, 0xf4c, 0xbbd}], 0x18) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') unshare(0x48020200) [ 1892.484746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=9931 comm=syz-executor.2 22:19:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, 0x0, 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:46 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:46 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:46 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0x0, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 10) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:19:46 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) 22:19:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:46 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x28, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x11, 0x0, 0x0, @u64}]}, 0x28}}, 0x0) close_range(r1, r0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40008800}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x78, 0x3, 0x1, 0x801, 0x0, 0x0, {0x1, 0x0, 0xa}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1000}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x24, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x8}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0xe2}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x40}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x80, 0x3f}}]}}, @CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000044}, 0x4000800) r2 = perf_event_open(&(0x7f0000000440)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r1, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000e00", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf25250000000c00990000000000620000000a00340002020202020200000a00340001010101010100000a000600ffffffffffff00000a00060050505050505000000a000600ffffffffffff0000"], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) syz_open_dev$tty1(0xc, 0x4, 0x1) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffd) fcntl$addseals(r2, 0x409, 0x3) clock_gettime(0x4, &(0x7f0000000200)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f00000003c0)=[{{r3, r4/1000+60000}, 0x1f, 0xf4c, 0xbbd}], 0x18) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') unshare(0x48020200) [ 1904.441151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=9955 comm=syz-executor.0 [ 1904.465005] FAULT_INJECTION: forcing a failure. [ 1904.465005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1904.467668] CPU: 0 PID: 9956 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1904.469134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1904.470886] Call Trace: [ 1904.471449] dump_stack+0x107/0x167 [ 1904.472239] should_fail.cold+0x5/0xa [ 1904.473056] _copy_to_iter+0x264/0x12d0 [ 1904.473913] ? __lock_acquire+0x1657/0x5b00 [ 1904.474843] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1904.475891] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1904.476978] ? check_stack_object+0x6e/0xb0 [ 1904.477898] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1904.478990] ? __check_object_size+0xae/0x440 [ 1904.479944] tty_read+0x29a/0x5e0 [ 1904.480705] ? do_SAK+0x70/0x70 [ 1904.481433] do_iter_readv_writev+0x57c/0x750 [ 1904.482384] ? new_sync_write+0x660/0x660 [ 1904.483268] ? avc_policy_seqno+0x9/0x70 [ 1904.484143] ? fsnotify_perm.part.0+0x22d/0x620 [ 1904.485135] ? security_file_permission+0xb1/0xe0 [ 1904.486170] do_iter_read+0x301/0x760 [ 1904.486983] ? import_iovec+0x83/0xb0 [ 1904.487805] vfs_readv+0xe5/0x160 [ 1904.488548] ? vfs_iter_read+0xa0/0xa0 [ 1904.489382] ? __fget_files+0x2cf/0x520 [ 1904.490222] ? lock_downgrade+0x6d0/0x6d0 [ 1904.491101] ? find_held_lock+0x2c/0x110 [ 1904.491971] ? ksys_write+0x12d/0x260 [ 1904.492790] ? __fget_files+0x2f8/0x520 [ 1904.493645] ? __fget_light+0xea/0x290 [ 1904.494482] do_readv+0x139/0x300 [ 1904.495220] ? vfs_readv+0x160/0x160 [ 1904.496034] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1904.497143] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1904.498239] do_syscall_64+0x33/0x40 [ 1904.499029] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1904.500132] RIP: 0033:0x7f313bf62b19 [ 1904.500918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1904.504834] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1904.506451] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1904.507960] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1904.509487] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1904.510997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1904.512519] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:46 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:46 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:46 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0x0, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:46 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:46 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 11) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:19:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, 0x0, 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:19:46 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6306261f, 0x80000001}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="2503f2ffff459d6eb60f0100000008000100cd3d7ddffc60752be90000000000"], 0x28}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[@ANYRESDEC], 0x2c}, 0x1, 0x0, 0x0, 0x20048805}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)=0x2) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280), r2) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f00000007c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4008000}, 0x10) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={0x0}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) [ 1904.997873] FAULT_INJECTION: forcing a failure. [ 1904.997873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1905.001118] CPU: 0 PID: 9972 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1905.002840] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1905.004943] Call Trace: [ 1905.005624] dump_stack+0x107/0x167 [ 1905.006549] should_fail.cold+0x5/0xa [ 1905.007529] _copy_to_iter+0x264/0x12d0 [ 1905.008560] ? __lock_acquire+0x1657/0x5b00 [ 1905.009662] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1905.010909] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1905.012207] ? check_stack_object+0x6e/0xb0 [ 1905.013319] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1905.014623] ? __check_object_size+0xae/0x440 [ 1905.015768] tty_read+0x29a/0x5e0 [ 1905.016666] ? do_SAK+0x70/0x70 [ 1905.017543] do_iter_readv_writev+0x57c/0x750 [ 1905.018682] ? new_sync_write+0x660/0x660 [ 1905.019733] ? avc_policy_seqno+0x9/0x70 [ 1905.020782] ? fsnotify_perm.part.0+0x22d/0x620 [ 1905.021968] ? security_file_permission+0xb1/0xe0 [ 1905.023232] do_iter_read+0x301/0x760 [ 1905.024216] ? import_iovec+0x83/0xb0 [ 1905.025194] vfs_readv+0xe5/0x160 [ 1905.026084] ? vfs_iter_read+0xa0/0xa0 [ 1905.027072] ? __fget_files+0x2cf/0x520 [ 1905.028103] ? lock_downgrade+0x6d0/0x6d0 [ 1905.029152] ? find_held_lock+0x2c/0x110 [ 1905.030191] ? ksys_write+0x12d/0x260 [ 1905.031178] ? __fget_files+0x2f8/0x520 [ 1905.032209] ? __fget_light+0xea/0x290 [ 1905.033213] do_readv+0x139/0x300 [ 1905.034097] ? vfs_readv+0x160/0x160 [ 1905.035054] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1905.036398] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1905.037706] do_syscall_64+0x33/0x40 [ 1905.038650] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1905.039933] RIP: 0033:0x7f313bf62b19 [ 1905.040885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1905.045455] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1905.047350] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1905.049157] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1905.050886] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1905.052647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1905.054428] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:19:46 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:19:46 executing program 2: ftruncate(0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1/file0\x00', 0x0, 0x4, &(0x7f00000005c0)) lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)) lstat(&(0x7f0000000280)='./file1/file0\x00', &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x20002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0xc, &(0x7f0000000100)=0x3f, 0x4) io_uring_enter(r0, 0x1a63, 0x17, 0x2, &(0x7f0000000040)={[0xfffffffffffffffb]}, 0x8) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x1bc}}, 0x20004000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc9a, 0x400, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) fcntl$notify(0xffffffffffffffff, 0x402, 0x20) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000c00"/28], 0x1c}}, 0x20040000) 22:19:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 12) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1905.235985] netlink: 408 bytes leftover after parsing attributes in process `syz-executor.2'. 22:19:46 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:19:46 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) [ 1905.291692] netlink: 408 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1905.349991] FAULT_INJECTION: forcing a failure. [ 1905.349991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1905.352986] CPU: 0 PID: 9989 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1905.354565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1905.356493] Call Trace: [ 1905.357091] dump_stack+0x107/0x167 [ 1905.357908] should_fail.cold+0x5/0xa [ 1905.358782] _copy_to_iter+0x264/0x12d0 [ 1905.359706] ? __lock_acquire+0x1657/0x5b00 [ 1905.360719] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1905.361840] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1905.363001] ? check_stack_object+0x6e/0xb0 [ 1905.363998] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1905.365201] ? __check_object_size+0xae/0x440 [ 1905.366243] tty_read+0x29a/0x5e0 [ 1905.367051] ? do_SAK+0x70/0x70 [ 1905.367835] do_iter_readv_writev+0x57c/0x750 [ 1905.368881] ? new_sync_write+0x660/0x660 [ 1905.369832] ? avc_policy_seqno+0x9/0x70 [ 1905.370767] ? fsnotify_perm.part.0+0x22d/0x620 [ 1905.371835] ? security_file_permission+0xb1/0xe0 [ 1905.372956] do_iter_read+0x301/0x760 [ 1905.373825] ? import_iovec+0x83/0xb0 [ 1905.374693] vfs_readv+0xe5/0x160 [ 1905.375483] ? vfs_iter_read+0xa0/0xa0 [ 1905.376372] ? __fget_files+0x2cf/0x520 [ 1905.377284] ? lock_downgrade+0x6d0/0x6d0 [ 1905.378225] ? find_held_lock+0x2c/0x110 [ 1905.379161] ? ksys_write+0x12d/0x260 [ 1905.380051] ? __fget_files+0x2f8/0x520 [ 1905.380964] ? __fget_light+0xea/0x290 [ 1905.381860] do_readv+0x139/0x300 [ 1905.382647] ? vfs_readv+0x160/0x160 [ 1905.383504] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1905.384706] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1905.385877] do_syscall_64+0x33/0x40 [ 1905.386721] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1905.387879] RIP: 0033:0x7f313bf62b19 [ 1905.388737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1905.392858] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1905.394559] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1905.396157] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1905.397758] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1905.399356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1905.400957] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:20:01 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:01 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:20:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, 0x0, 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:01 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:01 executing program 2: r0 = syz_io_uring_setup(0x19, &(0x7f0000002fc0)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000003040), &(0x7f0000000080)) syz_io_uring_setup(0x43b, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000500)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) io_uring_enter(r2, 0x2ea3, 0xfea8, 0x2, &(0x7f0000000040)={[0x2]}, 0x8) shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) 22:20:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0xee) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) fsopen(&(0x7f0000000100)='cgroup2\x00', 0x0) 22:20:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 13) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:01 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x0, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1919.809554] FAULT_INJECTION: forcing a failure. [ 1919.809554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1919.812403] CPU: 1 PID: 10016 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1919.813870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1919.815639] Call Trace: [ 1919.816200] dump_stack+0x107/0x167 [ 1919.816992] should_fail.cold+0x5/0xa [ 1919.817809] _copy_to_iter+0x264/0x12d0 [ 1919.818656] ? __lock_acquire+0x1657/0x5b00 [ 1919.819574] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1919.820619] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1919.821694] ? check_stack_object+0x6e/0xb0 [ 1919.822608] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1919.823698] ? __check_object_size+0xae/0x440 [ 1919.824661] tty_read+0x29a/0x5e0 [ 1919.825400] ? do_SAK+0x70/0x70 [ 1919.826135] do_iter_readv_writev+0x57c/0x750 [ 1919.827092] ? new_sync_write+0x660/0x660 [ 1919.827977] ? avc_policy_seqno+0x9/0x70 [ 1919.828857] ? fsnotify_perm.part.0+0x22d/0x620 [ 1919.829836] ? security_file_permission+0xb1/0xe0 [ 1919.830876] do_iter_read+0x301/0x760 [ 1919.831701] ? import_iovec+0x83/0xb0 [ 1919.832532] vfs_readv+0xe5/0x160 [ 1919.833286] ? vfs_iter_read+0xa0/0xa0 [ 1919.834120] ? __fget_files+0x2cf/0x520 [ 1919.835010] ? lock_downgrade+0x6d0/0x6d0 [ 1919.835939] ? find_held_lock+0x2c/0x110 [ 1919.836828] ? ksys_write+0x12d/0x260 [ 1919.837648] ? __fget_files+0x2f8/0x520 [ 1919.838558] ? __fget_light+0xea/0x290 [ 1919.839431] do_readv+0x139/0x300 [ 1919.840199] ? vfs_readv+0x160/0x160 [ 1919.841022] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1919.842150] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1919.843298] do_syscall_64+0x33/0x40 [ 1919.844128] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1919.845231] RIP: 0033:0x7f313bf62b19 [ 1919.846029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1919.849979] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1919.851633] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1919.853191] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1919.854723] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1919.856230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1919.857771] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:20:15 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x0, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:15 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:15 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:20:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8990}}, './file0\x00'}) accept4$unix(r2, &(0x7f00000003c0)=@abs, &(0x7f0000000200)=0x6e, 0x80800) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000180)={'vcan0\x00', &(0x7f0000000000)=@ethtool_channels={0x3d, 0xfff, 0xfffffff8, 0x5, 0x14, 0x1, 0x1, 0x9, 0x6}}) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r3, 0x0, 0x0, &(0x7f0000000080), 0x4) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r3, 0xf502, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'macsec0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="3c00000001000000030015c1e10000030000000220000001dee8fc131fc92b5700000001019c8068fb93f20624d998bb2382fbef2e605d20eff13ad8020454fe726d5ec46065bf6e5c2fd748b7382cb035aee7d0767514f38131261d18dc877d94a5429cb8a457a5b05860b7aad036c753e3ef8362fca8b5a6167f735a0e01f1da976d4ea58353ea98c1d7b7b7c1cc80a11e2e3edfa900eb32f6acb9e474280f6ee7c7ef1e824250a39d1cb5c39a35d267adb9e0a4f75fa873632140f722e853b6247e4996d13f8f53d320adfdaa104c2f08216c96dba4662424e175753048154832c4ccc43d3f767afc07b3f93847a1042034ea35d59aeece"]}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) unshare(0x48020200) 22:20:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 14) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:15 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x0, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:15 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) [ 1933.717272] FAULT_INJECTION: forcing a failure. [ 1933.717272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1933.720433] CPU: 1 PID: 10040 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1933.721980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1933.723841] Call Trace: [ 1933.724451] dump_stack+0x107/0x167 [ 1933.725273] should_fail.cold+0x5/0xa [ 1933.726141] _copy_to_iter+0x264/0x12d0 [ 1933.727049] ? __lock_acquire+0x1657/0x5b00 [ 1933.728032] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1933.729144] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1933.730279] ? check_stack_object+0x6e/0xb0 [ 1933.731246] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1933.732418] ? __check_object_size+0xae/0x440 [ 1933.733428] tty_read+0x29a/0x5e0 [ 1933.734222] ? do_SAK+0x70/0x70 [ 1933.735004] do_iter_readv_writev+0x57c/0x750 [ 1933.736012] ? new_sync_write+0x660/0x660 [ 1933.736951] ? avc_policy_seqno+0x9/0x70 [ 1933.737867] ? fsnotify_perm.part.0+0x22d/0x620 [ 1933.738917] ? security_file_permission+0xb1/0xe0 [ 1933.740005] do_iter_read+0x301/0x760 [ 1933.740882] ? import_iovec+0x83/0xb0 [ 1933.741749] vfs_readv+0xe5/0x160 [ 1933.742537] ? vfs_iter_read+0xa0/0xa0 [ 1933.743416] ? __fget_files+0x2cf/0x520 [ 1933.744309] ? lock_downgrade+0x6d0/0x6d0 [ 1933.745238] ? find_held_lock+0x2c/0x110 [ 1933.746160] ? ksys_write+0x12d/0x260 [ 1933.747035] ? __fget_files+0x2f8/0x520 [ 1933.747942] ? __fget_light+0xea/0x290 [ 1933.748835] do_readv+0x139/0x300 [ 1933.749620] ? vfs_readv+0x160/0x160 [ 1933.750466] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1933.751664] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1933.752831] do_syscall_64+0x33/0x40 [ 1933.753670] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1933.754815] RIP: 0033:0x7f313bf62b19 [ 1933.755644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1933.759809] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1933.761529] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1933.763133] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1933.764737] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1933.766333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1933.767928] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:20:15 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 1) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:15 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) [ 1933.912049] FAULT_INJECTION: forcing a failure. [ 1933.912049] name failslab, interval 1, probability 0, space 0, times 0 [ 1933.914669] CPU: 0 PID: 10044 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1933.916096] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1933.917796] Call Trace: [ 1933.918342] dump_stack+0x107/0x167 [ 1933.919102] should_fail.cold+0x5/0xa [ 1933.919896] ? getname_flags.part.0+0x50/0x4f0 [ 1933.920853] should_failslab+0x5/0x20 [ 1933.921633] kmem_cache_alloc+0x5b/0x310 [ 1933.922479] getname_flags.part.0+0x50/0x4f0 [ 1933.923385] getname+0x8e/0xd0 [ 1933.924054] do_sys_openat2+0xf9/0x4d0 [ 1933.924878] ? build_open_flags+0x6f0/0x6f0 [ 1933.925794] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1933.926808] ? wait_for_completion_io+0x270/0x270 [ 1933.927801] __x64_sys_openat+0x13f/0x1f0 [ 1933.928674] ? __ia32_sys_open+0x1c0/0x1c0 [ 1933.929542] ? ksys_write+0x1a9/0x260 [ 1933.930335] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1933.931413] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1933.932486] do_syscall_64+0x33/0x40 [ 1933.933253] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1933.934314] RIP: 0033:0x7f213a2cab19 [ 1933.935079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1933.938899] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1933.940461] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1933.941921] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1933.943376] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1933.944852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1933.946317] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 22:20:15 executing program 2: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00']}, 0x544) 22:20:15 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 2) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 15) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1934.109176] FAULT_INJECTION: forcing a failure. [ 1934.109176] name failslab, interval 1, probability 0, space 0, times 0 [ 1934.111887] CPU: 0 PID: 10055 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1934.113340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1934.115069] Call Trace: [ 1934.115642] dump_stack+0x107/0x167 [ 1934.116415] should_fail.cold+0x5/0xa [ 1934.117208] ? create_object.isra.0+0x3a/0xa30 [ 1934.118153] should_failslab+0x5/0x20 [ 1934.118954] kmem_cache_alloc+0x5b/0x310 [ 1934.119806] create_object.isra.0+0x3a/0xa30 [ 1934.120628] FAULT_INJECTION: forcing a failure. [ 1934.120628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1934.120930] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1934.120959] kmem_cache_alloc+0x159/0x310 [ 1934.125939] getname_flags.part.0+0x50/0x4f0 [ 1934.127088] getname+0x8e/0xd0 [ 1934.127919] do_sys_openat2+0xf9/0x4d0 [ 1934.128944] ? build_open_flags+0x6f0/0x6f0 [ 1934.130064] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1934.131308] ? wait_for_completion_io+0x270/0x270 [ 1934.132587] __x64_sys_openat+0x13f/0x1f0 [ 1934.133663] ? __ia32_sys_open+0x1c0/0x1c0 [ 1934.134761] ? ksys_write+0x1a9/0x260 [ 1934.135748] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1934.137109] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1934.138429] do_syscall_64+0x33/0x40 [ 1934.139297] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1934.140623] RIP: 0033:0x7f213a2cab19 [ 1934.141590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1934.146315] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1934.148269] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1934.150120] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1934.151957] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1934.153803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1934.155639] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 [ 1934.157506] CPU: 1 PID: 10053 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1934.159094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1934.160982] Call Trace: [ 1934.161593] dump_stack+0x107/0x167 [ 1934.162422] should_fail.cold+0x5/0xa [ 1934.163285] _copy_to_iter+0x264/0x12d0 [ 1934.164184] ? __lock_acquire+0x1657/0x5b00 [ 1934.165165] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1934.166261] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1934.167401] ? check_stack_object+0x6e/0xb0 [ 1934.168374] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1934.169540] ? __check_object_size+0xae/0x440 [ 1934.170544] tty_read+0x29a/0x5e0 [ 1934.171328] ? do_SAK+0x70/0x70 [ 1934.172119] do_iter_readv_writev+0x57c/0x750 [ 1934.173164] ? new_sync_write+0x660/0x660 [ 1934.174116] ? avc_policy_seqno+0x9/0x70 [ 1934.175046] ? fsnotify_perm.part.0+0x22d/0x620 [ 1934.176116] ? security_file_permission+0xb1/0xe0 [ 1934.177255] do_iter_read+0x301/0x760 [ 1934.178135] ? import_iovec+0x83/0xb0 [ 1934.179025] vfs_readv+0xe5/0x160 [ 1934.179820] ? vfs_iter_read+0xa0/0xa0 [ 1934.180728] ? __fget_files+0x2cf/0x520 [ 1934.181650] ? lock_downgrade+0x6d0/0x6d0 [ 1934.182593] ? find_held_lock+0x2c/0x110 [ 1934.183548] ? ksys_write+0x12d/0x260 [ 1934.184434] ? __fget_files+0x2f8/0x520 [ 1934.185358] ? __fget_light+0xea/0x290 [ 1934.186253] do_readv+0x139/0x300 [ 1934.187057] ? vfs_readv+0x160/0x160 [ 1934.187914] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1934.189128] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1934.190318] do_syscall_64+0x33/0x40 [ 1934.191177] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1934.192359] RIP: 0033:0x7f313bf62b19 [ 1934.193227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1934.197453] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1934.199206] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1934.200855] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1934.202516] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1934.204160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1934.205822] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:20:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:15 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:15 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) get_mempolicy(&(0x7f0000000080), &(0x7f00000001c0), 0x80000001, &(0x7f0000ffe000/0x2000)=nil, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_io_uring_complete(0x0) r1 = epoll_create(0x1) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000003c0)=ANY=[@ANYBLOB="8f4275dc21060000000000002000"/25, @ANYRES32, @ANYBLOB="82c1503ad0a804c3a883d0f28926d85087fe90cc09e8a570dc05b1439dbbf2d4c5aa0da592a4932f5bc29958d9d2c14f317adb1c4cab4190e45c357b36629b6c0c35ee3eb657d1cc300c8f72c914666a9000835850a95ec5"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xa0000003}) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000180)=0x800, 0x2, 0x2) r2 = clone3(&(0x7f0000000580)={0x48000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000240), {0x2}, &(0x7f00000002c0)=""/158, 0x9e, &(0x7f0000000480)=""/224, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) syz_open_procfs(r2, &(0x7f0000000100)='task\x00') 22:20:15 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x0, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:16 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x0, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:16 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 3) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1934.526079] FAULT_INJECTION: forcing a failure. [ 1934.526079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1934.529165] CPU: 1 PID: 10072 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1934.530775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1934.532735] Call Trace: [ 1934.533363] dump_stack+0x107/0x167 [ 1934.534228] should_fail.cold+0x5/0xa [ 1934.535134] strncpy_from_user+0x34/0x470 [ 1934.536109] getname_flags.part.0+0x95/0x4f0 [ 1934.537149] getname+0x8e/0xd0 [ 1934.537914] do_sys_openat2+0xf9/0x4d0 [ 1934.538829] ? build_open_flags+0x6f0/0x6f0 [ 1934.539836] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1934.540977] ? wait_for_completion_io+0x270/0x270 [ 1934.542110] __x64_sys_openat+0x13f/0x1f0 [ 1934.543069] ? __ia32_sys_open+0x1c0/0x1c0 [ 1934.544049] ? ksys_write+0x1a9/0x260 [ 1934.544953] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1934.546184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1934.547383] do_syscall_64+0x33/0x40 [ 1934.548256] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1934.549453] RIP: 0033:0x7f213a2cab19 [ 1934.550321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1934.554584] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1934.556361] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1934.558027] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1934.559702] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1934.561374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1934.563009] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 22:20:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 16) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:33 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) get_mempolicy(&(0x7f0000000080), &(0x7f00000001c0), 0x80000001, &(0x7f0000ffe000/0x2000)=nil, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) syz_io_uring_complete(0x0) r1 = epoll_create(0x1) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000003c0)=ANY=[@ANYBLOB="8f4275dc21060000000000002000"/25, @ANYRES32, @ANYBLOB="82c1503ad0a804c3a883d0f28926d85087fe90cc09e8a570dc05b1439dbbf2d4c5aa0da592a4932f5bc29958d9d2c14f317adb1c4cab4190e45c357b36629b6c0c35ee3eb657d1cc300c8f72c914666a9000835850a95ec5"]) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xa0000003}) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000180)=0x800, 0x2, 0x2) r2 = clone3(&(0x7f0000000580)={0x48000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000240), {0x2}, &(0x7f00000002c0)=""/158, 0x9e, &(0x7f0000000480)=""/224, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) syz_open_procfs(r2, &(0x7f0000000100)='task\x00') [ 1951.903987] FAULT_INJECTION: forcing a failure. [ 1951.903987] name failslab, interval 1, probability 0, space 0, times 0 [ 1951.905739] CPU: 1 PID: 10082 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1951.906683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1951.907803] Call Trace: [ 1951.908168] dump_stack+0x107/0x167 [ 1951.908671] should_fail.cold+0x5/0xa [ 1951.909197] ? __alloc_file+0x21/0x320 [ 1951.909725] should_failslab+0x5/0x20 [ 1951.910252] kmem_cache_alloc+0x5b/0x310 [ 1951.910804] __alloc_file+0x21/0x320 [ 1951.911314] alloc_empty_file+0x6d/0x170 [ 1951.911869] path_openat+0xe6/0x2770 [ 1951.912380] ? __lock_acquire+0x1657/0x5b00 [ 1951.912979] ? path_lookupat+0x860/0x860 [ 1951.913532] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1951.914255] ? lock_acquire+0x197/0x470 [ 1951.914799] ? find_held_lock+0x2c/0x110 [ 1951.915357] do_filp_open+0x190/0x3e0 [ 1951.915864] ? may_open_dev+0xf0/0xf0 [ 1951.916387] ? alloc_fd+0x2e7/0x670 [ 1951.916898] ? lock_downgrade+0x6d0/0x6d0 [ 1951.917463] ? do_raw_spin_lock+0x121/0x260 [ 1951.918045] ? rwlock_bug.part.0+0x90/0x90 [ 1951.918627] ? _raw_spin_unlock+0x1a/0x30 [ 1951.919185] ? alloc_fd+0x2e7/0x670 [ 1951.919685] do_sys_openat2+0x171/0x4d0 [ 1951.920222] ? build_open_flags+0x6f0/0x6f0 [ 1951.920823] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1951.921483] ? wait_for_completion_io+0x270/0x270 [ 1951.922136] __x64_sys_openat+0x13f/0x1f0 [ 1951.922709] ? __ia32_sys_open+0x1c0/0x1c0 [ 1951.923281] ? ksys_write+0x1a9/0x260 [ 1951.923793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1951.924500] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1951.925210] do_syscall_64+0x33/0x40 [ 1951.925711] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1951.926410] RIP: 0033:0x7f213a2cab19 [ 1951.926922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1951.929431] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1951.930463] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1951.931428] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1951.932408] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1951.933385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1951.934349] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 22:20:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:33 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:33 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0x0, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:33 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) 22:20:33 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x0, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1951.970011] FAULT_INJECTION: forcing a failure. [ 1951.970011] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1951.973313] CPU: 0 PID: 10085 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1951.974946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1951.976912] Call Trace: [ 1951.977547] dump_stack+0x107/0x167 [ 1951.978432] should_fail.cold+0x5/0xa [ 1951.979341] _copy_to_iter+0x264/0x12d0 [ 1951.980295] ? __lock_acquire+0x1657/0x5b00 [ 1951.981338] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1951.982517] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1951.983730] ? check_stack_object+0x6e/0xb0 [ 1951.984768] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1951.985986] ? __check_object_size+0xae/0x440 [ 1951.987052] tty_read+0x29a/0x5e0 [ 1951.987882] ? do_SAK+0x70/0x70 [ 1951.988709] do_iter_readv_writev+0x57c/0x750 [ 1951.989793] ? new_sync_write+0x660/0x660 [ 1951.990777] ? avc_policy_seqno+0x9/0x70 [ 1951.991748] ? fsnotify_perm.part.0+0x22d/0x620 [ 1951.992845] ? security_file_permission+0xb1/0xe0 [ 1951.993977] do_iter_read+0x301/0x760 [ 1951.994874] ? import_iovec+0x83/0xb0 [ 1951.995783] vfs_readv+0xe5/0x160 [ 1951.996592] ? vfs_iter_read+0xa0/0xa0 [ 1951.997514] ? __fget_files+0x2cf/0x520 [ 1951.998448] ? lock_downgrade+0x6d0/0x6d0 [ 1951.999418] ? find_held_lock+0x2c/0x110 [ 1952.000381] ? ksys_write+0x12d/0x260 [ 1952.001290] ? __fget_files+0x2f8/0x520 [ 1952.002239] ? __fget_light+0xea/0x290 [ 1952.003167] do_readv+0x139/0x300 [ 1952.003989] ? vfs_readv+0x160/0x160 [ 1952.004885] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.006121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.007337] do_syscall_64+0x33/0x40 [ 1952.008219] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.009421] RIP: 0033:0x7f313bf62b19 [ 1952.010293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.014542] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1952.016305] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1952.017959] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1952.019597] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.021260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.022904] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:20:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:33 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f00000010c0)={0x20000000, 0x3e, 0x2, @thr={0x0, 0x0}}) r0 = socket$nl_audit(0x10, 0x3, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x28}, 0x1}, 0x6) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000240)) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x25}, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x30, 0x0, @tid=r2}, &(0x7f0000000300)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400f8d100"/20], 0x14}}, 0x0) read(r3, &(0x7f0000000080)=""/65, 0x41) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000100)=0xfffffffffffff801) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x100000b, 0x42010, 0xffffffffffffffff, 0xb8768000) 22:20:33 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 5) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1952.148166] FAULT_INJECTION: forcing a failure. [ 1952.148166] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.149773] CPU: 1 PID: 10103 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1952.150622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.151638] Call Trace: [ 1952.151967] dump_stack+0x107/0x167 [ 1952.152421] should_fail.cold+0x5/0xa [ 1952.152899] ? create_object.isra.0+0x3a/0xa30 [ 1952.153462] should_failslab+0x5/0x20 [ 1952.153933] kmem_cache_alloc+0x5b/0x310 [ 1952.154443] create_object.isra.0+0x3a/0xa30 [ 1952.154986] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.155615] kmem_cache_alloc+0x159/0x310 [ 1952.156132] __alloc_file+0x21/0x320 [ 1952.156598] alloc_empty_file+0x6d/0x170 [ 1952.157119] path_openat+0xe6/0x2770 [ 1952.157580] ? __lock_acquire+0x1657/0x5b00 [ 1952.158116] ? path_lookupat+0x860/0x860 [ 1952.158623] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1952.159266] ? lock_acquire+0x197/0x470 [ 1952.159756] ? find_held_lock+0x2c/0x110 [ 1952.160272] do_filp_open+0x190/0x3e0 [ 1952.160748] ? may_open_dev+0xf0/0xf0 [ 1952.161220] ? alloc_fd+0x2e7/0x670 [ 1952.161669] ? lock_downgrade+0x6d0/0x6d0 [ 1952.162182] ? do_raw_spin_lock+0x121/0x260 [ 1952.162714] ? rwlock_bug.part.0+0x90/0x90 [ 1952.163240] ? _raw_spin_unlock+0x1a/0x30 [ 1952.163751] ? alloc_fd+0x2e7/0x670 [ 1952.164204] do_sys_openat2+0x171/0x4d0 [ 1952.164705] ? build_open_flags+0x6f0/0x6f0 [ 1952.165232] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1952.165828] ? wait_for_completion_io+0x270/0x270 [ 1952.166422] __x64_sys_openat+0x13f/0x1f0 [ 1952.166933] ? __ia32_sys_open+0x1c0/0x1c0 [ 1952.167450] ? ksys_write+0x1a9/0x260 [ 1952.167924] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.168567] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.169206] do_syscall_64+0x33/0x40 [ 1952.169661] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.170285] RIP: 0033:0x7f213a2cab19 [ 1952.170741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.173001] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1952.173936] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1952.174810] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1952.175682] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.176563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1952.177439] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 22:20:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 17) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:33 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0x0, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:33 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x48020200) 22:20:33 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="28000000130001000000000000000000000000000500000000ff07000c00008008009200", @ANYRES32, @ANYBLOB], 0x28}}, 0x0) 22:20:33 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x0, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1952.285623] FAULT_INJECTION: forcing a failure. [ 1952.285623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1952.288618] CPU: 0 PID: 10109 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1952.290220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.292144] Call Trace: [ 1952.292762] dump_stack+0x107/0x167 [ 1952.293602] should_fail.cold+0x5/0xa [ 1952.294495] _copy_to_iter+0x264/0x12d0 [ 1952.295430] ? __lock_acquire+0x1657/0x5b00 [ 1952.296438] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1952.297587] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1952.298776] ? check_stack_object+0x6e/0xb0 [ 1952.299776] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1952.300976] ? __check_object_size+0xae/0x440 [ 1952.302015] tty_read+0x29a/0x5e0 [ 1952.302823] ? do_SAK+0x70/0x70 [ 1952.303610] do_iter_readv_writev+0x57c/0x750 [ 1952.304648] ? new_sync_write+0x660/0x660 [ 1952.305590] ? avc_policy_seqno+0x9/0x70 [ 1952.306515] ? fsnotify_perm.part.0+0x22d/0x620 [ 1952.307581] ? security_file_permission+0xb1/0xe0 [ 1952.308710] do_iter_read+0x301/0x760 [ 1952.309588] ? import_iovec+0x83/0xb0 [ 1952.310468] vfs_readv+0xe5/0x160 [ 1952.311265] ? vfs_iter_read+0xa0/0xa0 [ 1952.312153] ? __fget_files+0x2cf/0x520 [ 1952.313073] ? lock_downgrade+0x6d0/0x6d0 [ 1952.314014] ? find_held_lock+0x2c/0x110 [ 1952.314949] ? ksys_write+0x12d/0x260 [ 1952.315828] ? __fget_files+0x2f8/0x520 [ 1952.316763] ? __fget_light+0xea/0x290 [ 1952.317660] do_readv+0x139/0x300 [ 1952.318455] ? vfs_readv+0x160/0x160 [ 1952.319303] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.320486] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.321671] do_syscall_64+0x33/0x40 [ 1952.322513] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.323675] RIP: 0033:0x7f313bf62b19 [ 1952.324526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.328716] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1952.330445] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1952.332059] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1952.333674] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.335285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1952.336918] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:20:34 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 6) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1952.407090] FAULT_INJECTION: forcing a failure. [ 1952.407090] name failslab, interval 1, probability 0, space 0, times 0 [ 1952.408680] CPU: 1 PID: 10121 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1952.409440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1952.410366] Call Trace: [ 1952.410673] dump_stack+0x107/0x167 [ 1952.411089] should_fail.cold+0x5/0xa [ 1952.411519] ? create_object.isra.0+0x3a/0xa30 [ 1952.412028] should_failslab+0x5/0x20 [ 1952.412452] kmem_cache_alloc+0x5b/0x310 [ 1952.412921] create_object.isra.0+0x3a/0xa30 [ 1952.413410] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1952.413976] kmem_cache_alloc+0x159/0x310 [ 1952.414440] __alloc_file+0x21/0x320 [ 1952.414852] alloc_empty_file+0x6d/0x170 [ 1952.415336] path_openat+0xe6/0x2770 [ 1952.415760] ? __lock_acquire+0x1657/0x5b00 [ 1952.416245] ? path_lookupat+0x860/0x860 [ 1952.416710] ? perf_trace_lock+0xac/0x490 [ 1952.417168] ? lock_acquire+0x197/0x470 [ 1952.417639] ? find_held_lock+0x2c/0x110 [ 1952.418091] ? __lockdep_reset_lock+0x180/0x180 [ 1952.418651] do_filp_open+0x190/0x3e0 [ 1952.419100] ? may_open_dev+0xf0/0xf0 [ 1952.419563] ? alloc_fd+0x2e7/0x670 [ 1952.419995] ? lock_downgrade+0x6d0/0x6d0 [ 1952.420490] ? do_raw_spin_lock+0x121/0x260 [ 1952.421010] ? rwlock_bug.part.0+0x90/0x90 [ 1952.421515] ? _raw_spin_unlock+0x1a/0x30 [ 1952.422002] ? alloc_fd+0x2e7/0x670 [ 1952.422441] do_sys_openat2+0x171/0x4d0 [ 1952.422918] ? build_open_flags+0x6f0/0x6f0 [ 1952.423430] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1952.424000] ? wait_for_completion_io+0x270/0x270 [ 1952.424582] __x64_sys_openat+0x13f/0x1f0 [ 1952.425088] ? __ia32_sys_open+0x1c0/0x1c0 [ 1952.425587] ? ksys_write+0x1a9/0x260 [ 1952.426045] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1952.426668] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1952.427287] do_syscall_64+0x33/0x40 [ 1952.427732] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1952.428349] RIP: 0033:0x7f213a2cab19 [ 1952.428797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1952.430974] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1952.431876] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1952.432726] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1952.433572] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1952.434429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1952.435289] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 22:20:46 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 7) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:46 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) 22:20:46 executing program 2: fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x4, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4d53, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000140)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) fsmount(r2, 0x0, 0x88) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@cache_mmap}, {@cache_none}]}}) 22:20:46 executing program 0: ftruncate(0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280041ee2f5e40aff165000c00000008e7048004000180080000000000000000000000a1000000000ca13a88d57d7e4af140e4cd795e0917bb1e195745652923bfd978cdd001002e5f4d"], 0x28}}, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r1, 0xee01, 0xee00) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f00000004c0)='encrypted\x00', &(0x7f00000006c0)=@keyring) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) request_key(&(0x7f00000008c0)='logon\x00', &(0x7f0000000900)={'syz', 0x1}, &(0x7f0000000980)='\xfeO\x1f\xf1Z,\x9ao\xc5\\\xab\x81\xfbF\t\xab\x1f\xed\x1e\x9a\x1cQ\xbcg\xd5$*$\x84=\xab\x02}-\xf9)g\xc3u\\^+\x00aY\xbf\xe2\xab>\xd3kPf^\xb3N\xd7\xcf2IAJ\xe8\xa2pm\xefP~\xed.\xfc\xf9\xe1\x81t\x1bGt\xd1\x06\xb3\x8cG\xf9rH\x18\x19\xe91\xa6H\x96\x9az9\x06I\xe8\xce|\x1c\xcc\x02n\xf3\xc4v\f\x12\x1cBP4\bo\x85<\xc9\x02\t\xce\xef\xe0\xec\xc4\'\x85\xa51\x7f\x9e\xd4\xfc\xa3x\xfaW\xc1\x18\xe7\xbc\a\xfb-\x1d\x89\xfc\xbdpm4\x18\xa7Vp\xcfgw\x95\xbbR\xc3I\x85\xaa\xa4\xc5\xf4\x8cR\x19', 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000600)=0x1e) syz_open_dev$usbmon(&(0x7f0000000080), 0x6, 0x151180) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x80, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x7fff, 0x0, 0x7, 0x1f, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:20:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 18) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:46 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0x0, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:46 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x0, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:20:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1964.901171] FAULT_INJECTION: forcing a failure. [ 1964.901171] name failslab, interval 1, probability 0, space 0, times 0 [ 1964.903864] CPU: 0 PID: 10135 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1964.905378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1964.907180] Call Trace: [ 1964.907757] dump_stack+0x107/0x167 [ 1964.908559] should_fail.cold+0x5/0xa [ 1964.909400] ? create_object.isra.0+0x3a/0xa30 [ 1964.910401] should_failslab+0x5/0x20 [ 1964.911231] kmem_cache_alloc+0x5b/0x310 [ 1964.912118] ? percpu_ref_put_many.constprop.0+0x4e/0x110 [ 1964.913307] create_object.isra.0+0x3a/0xa30 [ 1964.914261] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1964.915365] kmem_cache_alloc+0x159/0x310 [ 1964.916270] security_file_alloc+0x34/0x170 [ 1964.917201] __alloc_file+0xb7/0x320 [ 1964.918002] alloc_empty_file+0x6d/0x170 [ 1964.918891] path_openat+0xe6/0x2770 [ 1964.919705] ? __lock_acquire+0x1657/0x5b00 [ 1964.920658] ? path_lookupat+0x860/0x860 [ 1964.921552] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1964.922697] ? lock_acquire+0x197/0x470 [ 1964.923557] ? find_held_lock+0x2c/0x110 [ 1964.924439] do_filp_open+0x190/0x3e0 [ 1964.925278] ? may_open_dev+0xf0/0xf0 [ 1964.926112] ? alloc_fd+0x2e7/0x670 [ 1964.926899] ? lock_downgrade+0x6d0/0x6d0 [ 1964.927783] ? do_raw_spin_lock+0x121/0x260 [ 1964.928705] ? rwlock_bug.part.0+0x90/0x90 [ 1964.929629] ? _raw_spin_unlock+0x1a/0x30 [ 1964.930535] ? alloc_fd+0x2e7/0x670 [ 1964.931333] do_sys_openat2+0x171/0x4d0 [ 1964.932200] ? build_open_flags+0x6f0/0x6f0 [ 1964.933135] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1964.934171] ? wait_for_completion_io+0x270/0x270 [ 1964.935206] __x64_sys_openat+0x13f/0x1f0 [ 1964.936087] ? __ia32_sys_open+0x1c0/0x1c0 [ 1964.936992] ? ksys_write+0x1a9/0x260 [ 1964.937818] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1964.938936] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1964.940052] do_syscall_64+0x33/0x40 [ 1964.940864] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1964.941965] RIP: 0033:0x7f213a2cab19 [ 1964.942755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.946715] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1964.948335] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1964.949851] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1964.951369] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1964.952871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.954387] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 [ 1965.025004] FAULT_INJECTION: forcing a failure. [ 1965.025004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1965.028064] CPU: 0 PID: 10142 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1965.029711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1965.031685] Call Trace: [ 1965.032309] dump_stack+0x107/0x167 [ 1965.033179] should_fail.cold+0x5/0xa [ 1965.034085] _copy_to_iter+0x264/0x12d0 [ 1965.035035] ? __lock_acquire+0x1657/0x5b00 [ 1965.036062] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1965.037235] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1965.038433] ? check_stack_object+0x6e/0xb0 [ 1965.039452] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1965.040662] ? __check_object_size+0xae/0x440 [ 1965.041725] tty_read+0x29a/0x5e0 [ 1965.042544] ? do_SAK+0x70/0x70 [ 1965.043349] do_iter_readv_writev+0x57c/0x750 [ 1965.044405] ? new_sync_write+0x660/0x660 [ 1965.045385] ? avc_policy_seqno+0x9/0x70 [ 1965.046318] ? fsnotify_perm.part.0+0x22d/0x620 [ 1965.047423] ? security_file_permission+0xb1/0xe0 [ 1965.048552] do_iter_read+0x301/0x760 [ 1965.049455] ? import_iovec+0x83/0xb0 [ 1965.050352] vfs_readv+0xe5/0x160 [ 1965.051167] ? vfs_iter_read+0xa0/0xa0 [ 1965.052071] ? __fget_files+0x2cf/0x520 [ 1965.053019] ? lock_downgrade+0x6d0/0x6d0 [ 1965.053985] ? find_held_lock+0x2c/0x110 [ 1965.054942] ? ksys_write+0x12d/0x260 [ 1965.055825] ? __fget_files+0x2f8/0x520 [ 1965.056772] ? __fget_light+0xea/0x290 [ 1965.057683] do_readv+0x139/0x300 [ 1965.058484] ? vfs_readv+0x160/0x160 [ 1965.059357] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1965.060566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1965.061759] do_syscall_64+0x33/0x40 [ 1965.062615] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1965.063795] RIP: 0033:0x7f313bf62b19 [ 1965.064649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1965.068896] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1965.070646] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1965.072286] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1965.073933] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1965.075558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1965.077188] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 22:20:46 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:46 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x0, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1965.117087] FAULT_INJECTION: forcing a failure. [ 1965.117087] name failslab, interval 1, probability 0, space 0, times 0 22:20:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1965.119762] CPU: 0 PID: 10150 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1965.121385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 22:20:46 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) 22:20:46 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x0, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) [ 1965.123270] Call Trace: [ 1965.123909] dump_stack+0x107/0x167 [ 1965.124741] should_fail.cold+0x5/0xa [ 1965.125608] ? tty_alloc_file+0x3d/0xa0 [ 1965.126513] should_failslab+0x5/0x20 [ 1965.127381] kmem_cache_alloc_trace+0x55/0x320 [ 1965.128404] ? kobject_get_unless_zero+0x15a/0x1e0 [ 1965.129522] ? pty_open+0x310/0x310 [ 1965.130340] tty_alloc_file+0x3d/0xa0 [ 1965.131208] ptmx_open+0x63/0x370 [ 1965.131989] ? pty_open+0x310/0x310 [ 1965.132818] chrdev_open+0x268/0x6e0 [ 1965.133660] ? __unregister_chrdev+0x110/0x110 [ 1965.134689] ? fsnotify_perm.part.0+0x22d/0x620 [ 1965.135745] do_dentry_open+0x4b7/0x1090 [ 1965.136657] ? __unregister_chrdev+0x110/0x110 [ 1965.137682] ? may_open+0x1e4/0x400 [ 1965.138503] path_openat+0x19ba/0x2770 [ 1965.139390] ? path_lookupat+0x860/0x860 [ 1965.140312] ? lock_acquire+0x197/0x470 [ 1965.141208] ? find_held_lock+0x2c/0x110 [ 1965.142133] do_filp_open+0x190/0x3e0 [ 1965.143000] ? may_open_dev+0xf0/0xf0 [ 1965.143867] ? do_raw_spin_lock+0x121/0x260 [ 1965.144837] ? rwlock_bug.part.0+0x90/0x90 [ 1965.145804] ? _raw_spin_unlock+0x1a/0x30 [ 1965.146727] ? alloc_fd+0x2e7/0x670 [ 1965.147560] do_sys_openat2+0x171/0x4d0 [ 1965.148463] ? build_open_flags+0x6f0/0x6f0 [ 1965.149433] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1965.150517] ? wait_for_completion_io+0x270/0x270 [ 1965.151596] __x64_sys_openat+0x13f/0x1f0 [ 1965.152530] ? __ia32_sys_open+0x1c0/0x1c0 [ 1965.153483] ? ksys_write+0x1a9/0x260 [ 1965.154346] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1965.155520] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1965.156692] do_syscall_64+0x33/0x40 [ 1965.157537] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1965.158692] RIP: 0033:0x7f213a2cab19 [ 1965.159523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1965.163648] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1965.165358] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1965.166951] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1965.168542] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1965.170151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1965.171742] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 22:20:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 19) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:20:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, 0x0) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:20:46 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 1) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) [ 1965.379505] FAULT_INJECTION: forcing a failure. [ 1965.379505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1965.382541] CPU: 0 PID: 10168 Comm: syz-executor.5 Not tainted 5.10.241 #1 [ 1965.384113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1965.386009] Call Trace: [ 1965.386619] dump_stack+0x107/0x167 [ 1965.387458] should_fail.cold+0x5/0xa [ 1965.388338] _copy_to_iter+0x264/0x12d0 [ 1965.389242] ? __lock_acquire+0x1657/0x5b00 [ 1965.390223] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1965.391323] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1965.392481] ? check_stack_object+0x6e/0xb0 [ 1965.393460] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1965.394609] ? __check_object_size+0xae/0x440 [ 1965.395618] tty_read+0x29a/0x5e0 [ 1965.396414] ? do_SAK+0x70/0x70 [ 1965.397196] do_iter_readv_writev+0x57c/0x750 [ 1965.398225] ? new_sync_write+0x660/0x660 [ 1965.399154] ? avc_policy_seqno+0x9/0x70 [ 1965.400086] ? fsnotify_perm.part.0+0x22d/0x620 [ 1965.401162] ? security_file_permission+0xb1/0xe0 [ 1965.402266] do_iter_read+0x301/0x760 [ 1965.403142] ? import_iovec+0x83/0xb0 [ 1965.404018] vfs_readv+0xe5/0x160 [ 1965.404796] ? vfs_iter_read+0xa0/0xa0 [ 1965.405684] ? __fget_files+0x2cf/0x520 [ 1965.406586] ? lock_downgrade+0x6d0/0x6d0 [ 1965.407535] ? find_held_lock+0x2c/0x110 [ 1965.408456] ? ksys_write+0x12d/0x260 [ 1965.409338] ? __fget_files+0x2f8/0x520 [ 1965.410262] ? __fget_light+0xea/0x290 [ 1965.411157] do_readv+0x139/0x300 [ 1965.411958] ? vfs_readv+0x160/0x160 [ 1965.412793] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1965.414000] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1965.415182] do_syscall_64+0x33/0x40 [ 1965.416033] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1965.417197] RIP: 0033:0x7f313bf62b19 [ 1965.418031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1965.422260] RSP: 002b:00007f31394d8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1965.424335] RAX: ffffffffffffffda RBX: 00007f313c075f60 RCX: 00007f313bf62b19 [ 1965.425980] RDX: 1000000000000009 RSI: 0000000020000340 RDI: 0000000000000004 [ 1965.427612] RBP: 00007f31394d81d0 R08: 0000000000000000 R09: 0000000000000000 [ 1965.429257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1965.430883] R13: 00007ffcb7c1386f R14: 00007f31394d8300 R15: 0000000000022000 [ 1965.448838] FAULT_INJECTION: forcing a failure. [ 1965.448838] name failslab, interval 1, probability 0, space 0, times 0 [ 1965.450328] CPU: 1 PID: 10169 Comm: syz-executor.1 Not tainted 5.10.241 #1 [ 1965.451116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1965.452057] Call Trace: [ 1965.452359] dump_stack+0x107/0x167 [ 1965.452774] should_fail.cold+0x5/0xa [ 1965.453220] ? file_tty_write.constprop.0+0x707/0x910 [ 1965.453809] should_failslab+0x5/0x20 [ 1965.454244] __kmalloc+0x72/0x390 [ 1965.454645] ? mutex_trylock+0x237/0x2b0 [ 1965.455103] ? file_tty_write.constprop.0+0x29f/0x910 [ 1965.455695] file_tty_write.constprop.0+0x707/0x910 [ 1965.456280] ? lock_acquire+0x197/0x470 [ 1965.456736] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1965.457332] ? find_held_lock+0x2c/0x110 [ 1965.457814] new_sync_write+0x42c/0x660 [ 1965.458275] ? new_sync_read+0x6f0/0x6f0 [ 1965.458761] ? avc_policy_seqno+0x9/0x70 [ 1965.459225] ? selinux_file_permission+0x92/0x520 [ 1965.459771] ? security_file_permission+0xb1/0xe0 [ 1965.460335] vfs_write+0x7c0/0xb10 [ 1965.460749] ksys_write+0x12d/0x260 [ 1965.461156] ? __ia32_sys_read+0xb0/0xb0 [ 1965.461631] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1965.462216] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1965.462803] do_syscall_64+0x33/0x40 [ 1965.463226] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1965.463814] RIP: 0033:0x7fe19c708b19 [ 1965.464237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1965.466367] RSP: 002b:00007fe199c7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1965.467231] RAX: ffffffffffffffda RBX: 00007fe19c81bf60 RCX: 00007fe19c708b19 [ 1965.468062] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1965.468884] RBP: 00007fe199c7e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1965.469715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1965.470548] R13: 00007ffd7fee9b8f R14: 00007fe199c7e300 R15: 0000000000022000 [ 1979.725671] FAULT_INJECTION: forcing a failure. [ 1979.725671] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.727468] CPU: 1 PID: 10183 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1979.728420] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.729572] Call Trace: [ 1979.729943] dump_stack+0x107/0x167 [ 1979.730437] should_fail.cold+0x5/0xa [ 1979.730963] ? create_object.isra.0+0x3a/0xa30 [ 1979.731593] should_failslab+0x5/0x20 [ 1979.732108] kmem_cache_alloc+0x5b/0x310 [ 1979.732673] create_object.isra.0+0x3a/0xa30 [ 1979.733290] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1979.733992] kmem_cache_alloc_trace+0x151/0x320 [ 1979.734629] ? pty_open+0x310/0x310 [ 1979.735120] tty_alloc_file+0x3d/0xa0 [ 1979.735646] ptmx_open+0x63/0x370 [ 1979.736119] ? pty_open+0x310/0x310 [ 1979.736615] chrdev_open+0x268/0x6e0 [ 1979.737349] ? __unregister_chrdev+0x110/0x110 [ 1979.738158] ? fsnotify_perm.part.0+0x22d/0x620 [ 1979.738922] do_dentry_open+0x4b7/0x1090 [ 1979.739503] ? __unregister_chrdev+0x110/0x110 [ 1979.740136] ? may_open+0x1e4/0x400 [ 1979.740636] path_openat+0x19ba/0x2770 [ 1979.741205] ? path_lookupat+0x860/0x860 [ 1979.741895] ? lock_acquire+0x197/0x470 [ 1979.742542] ? find_held_lock+0x2c/0x110 22:21:01 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 9) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:21:01 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x0, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:21:01 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:21:01 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 2) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) 22:21:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, 0x0) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:21:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) (fail_nth: 20) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:21:01 executing program 2: pipe2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x140, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x9, 0x5, 0x0, 0xc3, 0x14, "b4fb2bc1a35f650e622db4a9ca40d5f1f371cf"}) creat(&(0x7f00000004c0)='./file0\x00', 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendto(r2, &(0x7f0000000400)="8b99c1799a490c7e0326982fc72119e7433423eb908074091df9a35434e4531e0595532842ca0fcad8cddd4aa25e814c5a2fd85e8180c3a5bf2e7db012f2f4d12ddb77b5adc51c4a9e609a7986500513614e2a88d94b88a6b2e2399de7517ae400339bcef0f10d1cf9dd0e2561ccb3ec8782b4cbb23a86d7df77c2ef2a44cfb64356018df1c77bc89824d2302bc943b83e183f1b5b2eccc1ef33af36ca6ec02e1806d161b8", 0xa5, 0x4040000, &(0x7f0000000540)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80) sendmmsg$inet6(r2, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r1, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r3 = signalfd4(r1, &(0x7f00000000c0)={[0x9]}, 0x8, 0x800) recvfrom(r3, &(0x7f00000001c0)=""/24, 0x18, 0x40002060, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast1, 0x3}, 0x80) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x81}}, './file0\x00'}) connect$inet(r4, &(0x7f0000000300)={0x2, 0x4e20, @remote}, 0x10) unshare(0x48020200) 22:21:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7da4, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) [ 1979.743246] do_filp_open+0x190/0x3e0 [ 1979.743906] ? may_open_dev+0xf0/0xf0 [ 1979.744438] ? do_raw_spin_lock+0x121/0x260 [ 1979.745052] ? rwlock_bug.part.0+0x90/0x90 [ 1979.745648] ? _raw_spin_unlock+0x1a/0x30 [ 1979.746213] ? alloc_fd+0x2e7/0x670 [ 1979.746719] do_sys_openat2+0x171/0x4d0 [ 1979.747268] ? build_open_flags+0x6f0/0x6f0 [ 1979.747859] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1979.748525] ? wait_for_completion_io+0x270/0x270 [ 1979.749222] __x64_sys_openat+0x13f/0x1f0 [ 1979.749786] ? __ia32_sys_open+0x1c0/0x1c0 [ 1979.750368] ? ksys_write+0x1a9/0x260 [ 1979.750883] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1979.751593] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.752305] do_syscall_64+0x33/0x40 [ 1979.752817] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1979.753566] RIP: 0033:0x7f213a2cab19 [ 1979.754071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.756656] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1979.757723] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1979.758730] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1979.759719] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1979.760713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1979.761716] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 [ 1979.784163] FAULT_INJECTION: forcing a failure. [ 1979.784163] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.786846] CPU: 0 PID: 10190 Comm: syz-executor.1 Not tainted 5.10.241 #1 [ 1979.788334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.790116] Call Trace: [ 1979.790677] dump_stack+0x107/0x167 [ 1979.791453] should_fail.cold+0x5/0xa [ 1979.792265] ? create_object.isra.0+0x3a/0xa30 [ 1979.793254] should_failslab+0x5/0x20 [ 1979.794060] kmem_cache_alloc+0x5b/0x310 [ 1979.794934] ? __lock_acquire+0xbb1/0x5b00 [ 1979.795839] create_object.isra.0+0x3a/0xa30 [ 1979.796767] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1979.797878] __kmalloc+0x16e/0x390 [ 1979.798633] ? mutex_trylock+0x237/0x2b0 [ 1979.799504] file_tty_write.constprop.0+0x707/0x910 [ 1979.800567] ? lock_acquire+0x197/0x470 [ 1979.801425] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1979.802498] ? find_held_lock+0x2c/0x110 [ 1979.803375] new_sync_write+0x42c/0x660 [ 1979.804222] ? new_sync_read+0x6f0/0x6f0 [ 1979.805111] ? avc_policy_seqno+0x9/0x70 [ 1979.805984] ? selinux_file_permission+0x92/0x520 [ 1979.807008] ? security_file_permission+0xb1/0xe0 [ 1979.808048] vfs_write+0x7c0/0xb10 [ 1979.808811] ksys_write+0x12d/0x260 [ 1979.809597] ? __ia32_sys_read+0xb0/0xb0 [ 1979.810465] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1979.811583] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.812687] do_syscall_64+0x33/0x40 [ 1979.813486] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1979.814567] RIP: 0033:0x7fe19c708b19 [ 1979.815356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.819311] RSP: 002b:00007fe199c7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1979.820932] RAX: ffffffffffffffda RBX: 00007fe19c81bf60 RCX: 00007fe19c708b19 [ 1979.822472] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1979.824017] RBP: 00007fe199c7e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1979.825548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1979.827074] R13: 00007ffd7fee9b8f R14: 00007fe199c7e300 R15: 0000000000022000 22:21:16 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x40000) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000180)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x10) ftruncate(0xffffffffffffffff, 0x1f) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4bc4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000140)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r2 = syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000300)='./file1\x00', 0x4, 0x1, &(0x7f0000000340)=[{&(0x7f00000004c0)="37846a6ffefd8e3115338e9d2c7d3f906e28a0fd241ec02f435cd0086b11027d868726075509e9ee26c91b601fbd6dd0fe0ce24ee26eef66914fd4f61cf86b3acd6da08287a9fa462368486cea8b22ccb5e199e649f7dfd37e88db454a50f65e819b7264e4c298e0b2e910e5e1249db5a1f6ae752b0db2dec32025a482237a7f0ec7a3a1713d640672da79f4cca0aa7870e6cbbd6b27c37bc31fc8ae693c35e605f59a3a27409fa0", 0xa8, 0x7}], 0xc01, &(0x7f0000000580)={[], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@dont_hash}, {@obj_role={'obj_role', 0x3d, ',(&$&^%$:+/['}}, {@fowner_eq}, {@subj_role={'subj_role', 0x3d, 'cache=mmap'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) openat(r2, &(0x7f0000000380)='./file1\x00', 0x240040, 0x4a) close(r1) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="2c776e6f3d4d0a882444cc54b4229957b7fc7c0f08e6113611807992081a0789ecaed68b9a26dbddde99416dddbf13ceecdb7fba66c393993d55cae30a1ea8d176221218a1e195d48ad48416eb5d96d100000000000000", @ANYRESHEX=r4, @ANYBLOB=',cache=mmap,cache=fscache,debug=0x0000000000000924,nodevmap,noextend,dfltgid=', @ANYRESHEX=0x0, @ANYBLOB=',afid=0x0000000000000345,\x00']) 22:21:16 executing program 0: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:21:16 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:21:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, 0x0) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) 22:21:16 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 3) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) 22:21:16 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x0, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:21:16 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:21:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1995.162996] FAULT_INJECTION: forcing a failure. [ 1995.162996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1995.165661] CPU: 1 PID: 10210 Comm: syz-executor.1 Not tainted 5.10.241 #1 [ 1995.167077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.168791] Call Trace: [ 1995.168812] FAULT_INJECTION: forcing a failure. [ 1995.168812] name failslab, interval 1, probability 0, space 0, times 0 [ 1995.169363] dump_stack+0x107/0x167 [ 1995.169423] should_fail.cold+0x5/0xa [ 1995.169448] _copy_from_iter+0x202/0xe80 [ 1995.174299] ? __virt_addr_valid+0x170/0x5d0 [ 1995.175214] ? __check_object_size+0x319/0x440 [ 1995.176153] file_tty_write.constprop.0+0x4d5/0x910 [ 1995.177176] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1995.178214] new_sync_write+0x42c/0x660 [ 1995.179026] ? new_sync_read+0x6f0/0x6f0 [ 1995.179872] ? avc_policy_seqno+0x9/0x70 [ 1995.180704] ? selinux_file_permission+0x92/0x520 [ 1995.181732] ? security_file_permission+0xb1/0xe0 [ 1995.182730] vfs_write+0x7c0/0xb10 [ 1995.183464] ksys_write+0x12d/0x260 [ 1995.184212] ? __ia32_sys_read+0xb0/0xb0 [ 1995.185048] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.186134] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.187202] do_syscall_64+0x33/0x40 [ 1995.187966] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.189019] RIP: 0033:0x7fe19c708b19 [ 1995.189778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1995.193537] RSP: 002b:00007fe199c7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1995.195091] RAX: ffffffffffffffda RBX: 00007fe19c81bf60 RCX: 00007fe19c708b19 [ 1995.196542] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1995.198010] RBP: 00007fe199c7e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1995.199466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1995.200919] R13: 00007ffd7fee9b8f R14: 00007fe199c7e300 R15: 0000000000022000 [ 1995.202429] CPU: 0 PID: 10219 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1995.203934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.205721] Call Trace: [ 1995.206297] dump_stack+0x107/0x167 [ 1995.207075] should_fail.cold+0x5/0xa [ 1995.207889] ? alloc_tty_struct+0x95/0x8e0 [ 1995.208793] should_failslab+0x5/0x20 [ 1995.209627] kmem_cache_alloc_trace+0x55/0x320 [ 1995.210610] ? ptmx_open+0x107/0x370 [ 1995.211407] ? pty_open+0x310/0x310 [ 1995.212181] alloc_tty_struct+0x95/0x8e0 [ 1995.213056] ? __do_SAK+0x30/0x30 [ 1995.213810] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1995.214836] ? pty_open+0x310/0x310 [ 1995.215610] tty_init_dev.part.0+0x20/0x610 [ 1995.216534] ? pty_open+0x310/0x310 [ 1995.217315] tty_init_dev+0x5b/0x80 [ 1995.218098] ptmx_open+0x116/0x370 [ 1995.218865] ? pty_open+0x310/0x310 [ 1995.219638] chrdev_open+0x268/0x6e0 [ 1995.220435] ? __unregister_chrdev+0x110/0x110 [ 1995.221423] ? fsnotify_perm.part.0+0x22d/0x620 [ 1995.222433] do_dentry_open+0x4b7/0x1090 [ 1995.223297] ? __unregister_chrdev+0x110/0x110 [ 1995.224267] ? may_open+0x1e4/0x400 [ 1995.225047] path_openat+0x19ba/0x2770 [ 1995.225895] ? path_lookupat+0x860/0x860 [ 1995.226769] ? lock_acquire+0x197/0x470 [ 1995.227617] ? find_held_lock+0x2c/0x110 [ 1995.228491] do_filp_open+0x190/0x3e0 [ 1995.229309] ? may_open_dev+0xf0/0xf0 [ 1995.230134] ? do_raw_spin_lock+0x121/0x260 [ 1995.231047] ? rwlock_bug.part.0+0x90/0x90 [ 1995.231954] ? _raw_spin_unlock+0x1a/0x30 [ 1995.232843] ? alloc_fd+0x2e7/0x670 [ 1995.233638] do_sys_openat2+0x171/0x4d0 [ 1995.234487] ? build_open_flags+0x6f0/0x6f0 [ 1995.235398] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1995.236420] ? wait_for_completion_io+0x270/0x270 [ 1995.237453] __x64_sys_openat+0x13f/0x1f0 [ 1995.238334] ? __ia32_sys_open+0x1c0/0x1c0 [ 1995.239234] ? ksys_write+0x1a9/0x260 [ 1995.240053] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.241165] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.242274] do_syscall_64+0x33/0x40 [ 1995.243068] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.244153] RIP: 0033:0x7f213a2cab19 [ 1995.244945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1995.248871] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1995.250490] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1995.252002] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1995.253519] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1995.255037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1995.256563] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 [ 1995.262838] 9pnet: Insufficient options for proto=fd 22:21:17 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0xc0}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:21:17 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000039", 0x34, 0x540}, {&(0x7f00000000c0)="02000000030000000400000030000f0000005ddd00"/32, 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000100)=ANY=[@ANYRES32]) openat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x22040, 0x10) 22:21:17 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 4) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) 22:21:17 executing program 3: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x0, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:21:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1995.567127] FAULT_INJECTION: forcing a failure. [ 1995.567127] name failslab, interval 1, probability 0, space 0, times 0 [ 1995.571415] CPU: 1 PID: 10234 Comm: syz-executor.1 Not tainted 5.10.241 #1 [ 1995.572865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.574627] Call Trace: [ 1995.575173] dump_stack+0x107/0x167 [ 1995.575936] should_fail.cold+0x5/0xa [ 1995.576729] ? tty_buffer_alloc+0x243/0x2b0 [ 1995.577641] should_failslab+0x5/0x20 [ 1995.578440] __kmalloc+0x72/0x390 [ 1995.579173] tty_buffer_alloc+0x243/0x2b0 [ 1995.580047] __tty_buffer_request_room+0x156/0x2a0 [ 1995.581059] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1995.582213] ? n_tty_write+0x1eb/0xfe0 [ 1995.583008] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1995.584262] pty_write+0xe6/0x110 [ 1995.584971] n_tty_write+0xa86/0xfe0 [ 1995.585779] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1995.586795] ? _copy_from_iter+0x37b/0xe80 [ 1995.587684] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1995.588731] ? __virt_addr_valid+0x170/0x5d0 [ 1995.589665] ? __check_object_size+0x319/0x440 [ 1995.590603] file_tty_write.constprop.0+0x529/0x910 [ 1995.591657] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1995.592682] new_sync_write+0x42c/0x660 [ 1995.593529] ? new_sync_read+0x6f0/0x6f0 [ 1995.594376] ? avc_policy_seqno+0x9/0x70 [ 1995.595226] ? selinux_file_permission+0x92/0x520 [ 1995.596236] ? security_file_permission+0xb1/0xe0 [ 1995.597235] vfs_write+0x7c0/0xb10 [ 1995.597986] ksys_write+0x12d/0x260 [ 1995.598730] ? __ia32_sys_read+0xb0/0xb0 [ 1995.599559] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.600622] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.601672] do_syscall_64+0x33/0x40 [ 1995.602431] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.603473] RIP: 0033:0x7fe19c708b19 [ 1995.604240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1995.608017] RSP: 002b:00007fe199c7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1995.609565] RAX: ffffffffffffffda RBX: 00007fe19c81bf60 RCX: 00007fe19c708b19 [ 1995.611012] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1995.612451] RBP: 00007fe199c7e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1995.613928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1995.615392] R13: 00007ffd7fee9b8f R14: 00007fe199c7e300 R15: 0000000000022000 [ 1995.616884] [ 1995.616893] ====================================================== [ 1995.616899] WARNING: possible circular locking dependency detected [ 1995.616904] 5.10.241 #1 Not tainted [ 1995.616910] ------------------------------------------------------ [ 1995.616917] syz-executor.1/10234 is trying to acquire lock: [ 1995.616922] ffffffff84f0dcc0 (console_owner){-.-.}-{0:0}, at: console_unlock+0x2e1/0xb40 [ 1995.616943] [ 1995.616948] but task is already holding lock: [ 1995.616952] ffff88801adf6158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1995.616973] [ 1995.616978] which lock already depends on the new lock. [ 1995.616980] [ 1995.616983] [ 1995.616989] the existing dependency chain (in reverse order) is: [ 1995.616992] [ 1995.616994] -> #2 (&port->lock){-.-.}-{2:2}: [ 1995.617013] _raw_spin_lock_irqsave+0x36/0x60 [ 1995.617018] tty_port_tty_get+0x1f/0x100 [ 1995.617024] tty_port_default_wakeup+0x11/0x40 [ 1995.617029] serial8250_tx_chars+0x51f/0xb00 [ 1995.617034] serial8250_start_tx+0x695/0xa60 [ 1995.617039] __uart_start.isra.0+0x17c/0x1c0 [ 1995.617043] uart_write+0x2f2/0x580 [ 1995.617048] do_output_char+0x5e8/0x870 [ 1995.617053] n_tty_write+0x4c9/0xfe0 [ 1995.617058] file_tty_write.constprop.0+0x529/0x910 [ 1995.617063] redirected_tty_write+0xa5/0xd0 [ 1995.617069] do_iter_readv_writev+0x476/0x750 [ 1995.617073] do_iter_write+0x191/0x700 [ 1995.617078] vfs_writev+0x1ae/0x620 [ 1995.617082] do_writev+0x139/0x300 [ 1995.617087] do_syscall_64+0x33/0x40 [ 1995.617092] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.617095] [ 1995.617098] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 1995.617117] _raw_spin_lock_irqsave+0x36/0x60 [ 1995.617122] serial8250_console_write+0x9f5/0xc60 [ 1995.617127] console_unlock+0x82a/0xb40 [ 1995.617132] register_console+0x40c/0x850 [ 1995.617137] univ8250_console_init+0x3a/0x4a [ 1995.617142] console_init+0x24c/0x356 [ 1995.617146] start_kernel+0x2e6/0x489 [ 1995.617152] secondary_startup_64_no_verify+0xbe/0xcb [ 1995.617154] [ 1995.617157] -> #0 (console_owner){-.-.}-{0:0}: [ 1995.617176] __lock_acquire+0x29e7/0x5b00 [ 1995.617180] lock_acquire+0x197/0x470 [ 1995.617185] console_unlock+0x360/0xb40 [ 1995.617190] vprintk_emit+0x1de/0x4e0 [ 1995.617194] vprintk_func+0x8b/0x140 [ 1995.617210] printk+0xba/0xf1 [ 1995.617215] should_fail+0x47a/0x5a0 [ 1995.617220] should_failslab+0x5/0x20 [ 1995.617224] __kmalloc+0x72/0x390 [ 1995.617229] tty_buffer_alloc+0x243/0x2b0 [ 1995.617234] __tty_buffer_request_room+0x156/0x2a0 [ 1995.617240] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1995.617247] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1995.617251] pty_write+0xe6/0x110 [ 1995.617256] n_tty_write+0xa86/0xfe0 [ 1995.617261] file_tty_write.constprop.0+0x529/0x910 [ 1995.617266] new_sync_write+0x42c/0x660 [ 1995.617270] vfs_write+0x7c0/0xb10 [ 1995.617275] ksys_write+0x12d/0x260 [ 1995.617279] do_syscall_64+0x33/0x40 [ 1995.617285] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.617287] [ 1995.617293] other info that might help us debug this: [ 1995.617295] [ 1995.617299] Chain exists of: [ 1995.617301] console_owner --> &port_lock_key --> &port->lock [ 1995.617325] [ 1995.617329] Possible unsafe locking scenario: [ 1995.617332] [ 1995.617337] CPU0 CPU1 [ 1995.617341] ---- ---- [ 1995.617344] lock(&port->lock); [ 1995.617356] lock(&port_lock_key); [ 1995.617368] lock(&port->lock); [ 1995.617378] lock(console_owner); [ 1995.617387] [ 1995.617391] *** DEADLOCK *** [ 1995.617393] [ 1995.617398] 6 locks held by syz-executor.1/10234: [ 1995.617401] #0: ffff88800fad2098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x90 [ 1995.617424] #1: ffff88800fad2130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: file_tty_write.constprop.0+0x29f/0x910 [ 1995.617449] #2: ffff88800fad22e8 (&tty->termios_rwsem){++++}-{3:3}, at: n_tty_write+0x1bf/0xfe0 [ 1995.617472] #3: ffffc90014661378 (&ldata->output_lock){+.+.}-{3:3}, at: n_tty_write+0xa4d/0xfe0 [ 1995.617495] #4: ffff88801adf6158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1995.617520] #5: ffffffff84fee040 (console_lock){+.+.}-{0:0}, at: vprintk_func+0x8b/0x140 [ 1995.617542] [ 1995.617545] stack backtrace: [ 1995.617552] CPU: 1 PID: 10234 Comm: syz-executor.1 Not tainted 5.10.241 #1 [ 1995.617560] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.617563] Call Trace: [ 1995.617567] dump_stack+0x107/0x167 [ 1995.617572] check_noncircular+0x263/0x2e0 [ 1995.617577] ? stack_trace_consume_entry+0x160/0x160 [ 1995.617582] ? print_circular_bug+0x470/0x470 [ 1995.617586] ? memcpy+0x39/0x60 [ 1995.617590] ? alloc_chain_hlocks+0x342/0x5a0 [ 1995.617595] __lock_acquire+0x29e7/0x5b00 [ 1995.617600] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1995.617604] lock_acquire+0x197/0x470 [ 1995.617609] ? console_unlock+0x2e1/0xb40 [ 1995.617613] ? lock_release+0x680/0x680 [ 1995.617618] ? lock_downgrade+0x6d0/0x6d0 [ 1995.617622] ? do_raw_spin_lock+0x121/0x260 [ 1995.617627] ? rwlock_bug.part.0+0x90/0x90 [ 1995.617631] console_unlock+0x360/0xb40 [ 1995.617636] ? console_unlock+0x2e1/0xb40 [ 1995.617640] ? devkmsg_read+0x730/0x730 [ 1995.617644] ? lock_release+0x680/0x680 [ 1995.617649] ? do_raw_spin_unlock+0x4f/0x220 [ 1995.617653] ? vprintk_func+0x8b/0x140 [ 1995.617658] vprintk_emit+0x1de/0x4e0 [ 1995.617662] vprintk_func+0x8b/0x140 [ 1995.617665] printk+0xba/0xf1 [ 1995.617670] ? record_print_text.cold+0x16/0x16 [ 1995.617674] should_fail+0x47a/0x5a0 [ 1995.617679] ? tty_buffer_alloc+0x243/0x2b0 [ 1995.617683] should_failslab+0x5/0x20 [ 1995.617687] __kmalloc+0x72/0x390 [ 1995.617692] tty_buffer_alloc+0x243/0x2b0 [ 1995.617697] __tty_buffer_request_room+0x156/0x2a0 [ 1995.617702] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1995.617707] ? n_tty_write+0x1eb/0xfe0 [ 1995.617713] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1995.617716] pty_write+0xe6/0x110 [ 1995.617721] n_tty_write+0xa86/0xfe0 [ 1995.617726] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1995.617730] ? _copy_from_iter+0x37b/0xe80 [ 1995.617736] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1995.617740] ? __virt_addr_valid+0x170/0x5d0 [ 1995.617745] ? __check_object_size+0x319/0x440 [ 1995.617750] file_tty_write.constprop.0+0x529/0x910 [ 1995.617755] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1995.617760] new_sync_write+0x42c/0x660 [ 1995.617764] ? new_sync_read+0x6f0/0x6f0 [ 1995.617769] ? avc_policy_seqno+0x9/0x70 [ 1995.617774] ? selinux_file_permission+0x92/0x520 [ 1995.617779] ? security_file_permission+0xb1/0xe0 [ 1995.617783] vfs_write+0x7c0/0xb10 [ 1995.617787] ksys_write+0x12d/0x260 [ 1995.617791] ? __ia32_sys_read+0xb0/0xb0 [ 1995.617796] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.617802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.617806] do_syscall_64+0x33/0x40 [ 1995.617811] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1995.617815] RIP: 0033:0x7fe19c708b19 [ 1995.617832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1995.617837] RSP: 002b:00007fe199c7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1995.617849] RAX: ffffffffffffffda RBX: 00007fe19c81bf60 RCX: 00007fe19c708b19 [ 1995.617856] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1995.617863] RBP: 00007fe199c7e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1995.617870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1995.617877] R13: 00007ffd7fee9b8f R14: 00007fe199c7e300 R15: 0000000000022000 22:21:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="feff00822db87c3d55efd9599e442eb7afdb49b36aca6ba79b96f004bd6d0886a18278e6d9821c9fc6c31f0c", @ANYRES32=r0, @ANYBLOB]) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x91) openat$hpet(0xffffffffffffff9c, 0x0, 0x2002, 0x0) r2 = creat(&(0x7f0000000000)='./file2\x00', 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200100000000000000000000000000027f00000100000000000000000000000000000070a200000000000a0000000000d7456c98e81196c6278716c0835070432c5c236322b69c9311dc175fd1cdf33303e319078f2c6a", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c7ba67cb7d38793daf5bb8e"], 0x134}}, 0x0) close(r2) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000000c0)={0x6200, 0x1f, 0x1}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="bce34510d8527213d252027f62fa048cff8850f972c239f267c267c9abd251de7cc1ae85da4f2e21f0b03f37b75ad3e5bc234a9e304695c89332d708f42a160c9e233786957d59a2da8ad9c9a6d7ee30c3a0d1233aaf478e8707dacc77bcbadbed9a4965762a884a8a4562b4660deebe4bbfac291a237c867a06b8f5292ee779c4a9d658e434614bc3c36a0177c16ef80b817804fcc7b384d2c51200c60d7b068a198e29512063a0a5cb437317f5ac214167f442779d8f52", @ANYRES16=r4, @ANYBLOB="0b0c02000000000000003f00000008000300513a5ff787b26fbdbd082a9d9b5bd0ad04f534ef7f5518bb5d2aa88d8a49acc1f24923145c999aa24ad6f41a34402bd10f81a5da53893bac0044a0b024b907735aadb93d0d96bdf218ff6f9ee49015c4e740700e4a89d209a4de5767568ed1c8ede1ca9f3adf99d764f06139aa0d86ab91e37ed5223b5eaff5af8b9135dea2468486bdcedf97a8450cb6055c72f86b8caac71db25859cd8d9697bcc357a2dafc3404710aaef73881677984d4be2f1c5701f6b076636089cc68acb2ff9d0655dca4cc33669e9dedab700ed2cb6e155dddb2072fd43df766ed4588f1dd670000000000000000", @ANYRES32=r6, @ANYBLOB="1c005e80080007000000000000000000000000000000c80000000000"], 0x38}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='c\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000426bd7000fbdbdf2510000000"], 0x14}}, 0x200400b0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) r7 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r7, 0x0, r1, 0x0, 0x200f5ef, 0x0) 22:21:17 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x140}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:21:17 executing program 6: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x0, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) unshare(0x48020200) 22:21:17 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 5) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) 22:21:17 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 11) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1995.955771] FAULT_INJECTION: forcing a failure. [ 1995.955771] name failslab, interval 1, probability 0, space 0, times 0 [ 1995.958293] CPU: 1 PID: 10255 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1995.959752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.961508] Call Trace: [ 1995.962063] dump_stack+0x107/0x167 [ 1995.962824] should_fail.cold+0x5/0xa [ 1995.963621] ? alloc_tty_struct+0x95/0x8e0 [ 1995.964506] should_failslab+0x5/0x20 [ 1995.965320] kmem_cache_alloc_trace+0x55/0x320 [ 1995.966292] ? ptmx_open+0x107/0x370 [ 1995.967078] ? pty_open+0x310/0x310 [ 1995.967838] alloc_tty_struct+0x95/0x8e0 [ 1995.968688] ? __do_SAK+0x30/0x30 [ 1995.969424] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1995.970434] ? pty_open+0x310/0x310 [ 1995.971194] tty_init_dev.part.0+0x20/0x610 [ 1995.972106] ? pty_open+0x310/0x310 [ 1995.972861] tty_init_dev+0x5b/0x80 [ 1995.973628] ptmx_open+0x116/0x370 [ 1995.974370] ? pty_open+0x310/0x310 [ 1995.975131] chrdev_open+0x268/0x6e0 [ 1995.975913] ? __unregister_chrdev+0x110/0x110 [ 1995.976878] ? fsnotify_perm.part.0+0x22d/0x620 [ 1995.977857] do_dentry_open+0x4b7/0x1090 [ 1995.978712] ? __unregister_chrdev+0x110/0x110 [ 1995.979659] ? may_open+0x1e4/0x400 [ 1995.980415] path_openat+0x19ba/0x2770 [ 1995.981235] ? path_lookupat+0x860/0x860 [ 1995.982086] ? __kernel_text_address+0x9/0x40 [ 1995.983027] ? unwind_get_return_address+0x55/0xa0 [ 1995.984057] ? lock_acquire+0x3ef/0x470 [ 1995.984885] ? lock_release+0x4d1/0x680 [ 1995.985735] ? lock_release+0x680/0x680 [ 1995.986564] ? __virt_addr_valid+0x346/0x5d0 [ 1995.987482] do_filp_open+0x190/0x3e0 [ 1995.988270] ? may_open_dev+0xf0/0xf0 [ 1995.989063] ? do_raw_spin_lock+0x121/0x260 [ 1995.989984] ? rwlock_bug.part.0+0x90/0x90 [ 1995.990869] ? _raw_spin_unlock+0x1a/0x30 [ 1995.991736] ? alloc_fd+0x2e7/0x670 [ 1995.992497] do_sys_openat2+0x171/0x4d0 22:21:17 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x180}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1995.993454] ? build_open_flags+0x6f0/0x6f0 [ 1995.994473] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1995.995480] ? wait_for_completion_io+0x270/0x270 [ 1995.996485] __x64_sys_openat+0x13f/0x1f0 [ 1995.997364] ? __ia32_sys_open+0x1c0/0x1c0 [ 1995.998245] ? ksys_write+0x1a9/0x260 [ 1995.999044] ? fpregs_assert_state_consistent+0xb9/0xe0 [ 1996.000155] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1996.001241] do_syscall_64+0x33/0x40 [ 1996.002019] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1996.003088] RIP: 0033:0x7f213a2cab19 [ 1996.003857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1996.007730] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1996.009335] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1996.010834] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1996.012326] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1996.013814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 22:21:17 executing program 0: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4882, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x800}, 0x0, 0x5, 0x7, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x15}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000003c0)=0xffffffffffffffff) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x49) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, '\x00', 0x40, 0x0}, 0x18b6}}, 0x0, 0x0, 0xc, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd44034e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) syz_io_uring_setup(0x3e01, &(0x7f0000000140)={0x0, 0x100018d7, 0x4, 0x1, 0x376, 0x0, r3}, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000fed000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000340)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000003bc0), 0x0, 0x20040080) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstatfs(r1, &(0x7f0000002e00)=""/4102) dup2(0xffffffffffffffff, r0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) [ 1996.015294] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 [ 1996.067526] FAULT_INJECTION: forcing a failure. [ 1996.067526] name failslab, interval 1, probability 0, space 0, times 0 [ 1996.069920] CPU: 1 PID: 10262 Comm: syz-executor.1 Not tainted 5.10.241 #1 [ 1996.071365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1996.073101] Call Trace: [ 1996.073660] dump_stack+0x107/0x167 [ 1996.074414] should_fail.cold+0x5/0xa [ 1996.075204] ? create_object.isra.0+0x3a/0xa30 [ 1996.076161] should_failslab+0x5/0x20 [ 1996.076951] kmem_cache_alloc+0x5b/0x310 [ 1996.077809] ? lock_release+0x680/0x680 [ 1996.078636] create_object.isra.0+0x3a/0xa30 [ 1996.079550] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1996.080610] __kmalloc+0x16e/0x390 [ 1996.081355] tty_buffer_alloc+0x243/0x2b0 [ 1996.082218] __tty_buffer_request_room+0x156/0x2a0 [ 1996.083246] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1996.084385] ? n_tty_write+0x1eb/0xfe0 [ 1996.085214] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1996.086444] pty_write+0xe6/0x110 [ 1996.087179] n_tty_write+0xa86/0xfe0 [ 1996.087950] ? lock_acquire+0x3ef/0x470 [ 1996.088781] ? lock_release+0x4d1/0x680 [ 1996.089617] ? lock_release+0x4d1/0x680 [ 1996.090446] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1996.091479] ? _copy_from_iter+0x37b/0xe80 [ 1996.092364] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 1996.093427] ? __virt_addr_valid+0x170/0x5d0 [ 1996.094342] ? __check_object_size+0x319/0x440 [ 1996.095304] file_tty_write.constprop.0+0x529/0x910 [ 1996.096341] ? n_tty_receive_char_lnext+0x6f0/0x6f0 [ 1996.097389] new_sync_write+0x42c/0x660 [ 1996.098221] ? new_sync_read+0x6f0/0x6f0 [ 1996.099069] ? __fget_files+0x2cf/0x520 [ 1996.099894] ? lock_downgrade+0x6d0/0x6d0 [ 1996.100752] ? avc_policy_seqno+0x9/0x70 [ 1996.101602] ? selinux_file_permission+0x92/0x520 [ 1996.102601] ? security_file_permission+0xb1/0xe0 [ 1996.103609] vfs_write+0x7c0/0xb10 [ 1996.104345] ksys_write+0x12d/0x260 [ 1996.105109] ? __ia32_sys_read+0xb0/0xb0 [ 1996.105971] ? fpregs_assert_state_consistent+0xb9/0xe0 [ 1996.107080] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1996.108168] do_syscall_64+0x33/0x40 [ 1996.108940] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1996.110011] RIP: 0033:0x7fe19c708b19 [ 1996.110784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1996.114649] RSP: 002b:00007fe199c7e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1996.116248] RAX: ffffffffffffffda RBX: 00007fe19c81bf60 RCX: 00007fe19c708b19 [ 1996.117740] RDX: 000000000000098a RSI: 0000000020000a00 RDI: 0000000000000004 [ 1996.119230] RBP: 00007fe199c7e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1996.120732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1996.122226] R13: 00007ffd7fee9b8f R14: 00007fe199c7e300 R15: 0000000000022000 22:21:17 executing program 4: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) (fail_nth: 12) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) 22:21:17 executing program 1: pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000500)={@private1, 0x70}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) sendmmsg$inet6(r1, &(0x7f0000004540)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @private0}, 0x1c, 0x0}}], 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) (fail_nth: 6) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1005}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_WANTACK(r2, 0x0, 0x0, &(0x7f0000000080), 0x4) write$binfmt_elf64(r2, 0x0, 0x0) unshare(0x0) 22:21:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000010000000050000000000007fec864b245e0f3f9be149f8000000ea2be9d045a5724c92349d777c021ae6168df807b31e1f4792aa34949f54233c9fe4556703b85ae5c38afeeba1c7ea358172eab6db00"/95], 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x1, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) unshare(0x48020200) [ 1996.200978] FAULT_INJECTION: forcing a failure. [ 1996.200978] name failslab, interval 1, probability 0, space 0, times 0 22:21:17 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000002c0)=0x1588, 0x4) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2, 0x7, 0x4, 0x52f, 0x8001}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[], 0x98a) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000180)={0x3, 0x5}) readv(r0, &(0x7f0000000340)=[{&(0x7f0000002340)=""/4101, 0x1c0}, {&(0x7f0000000380)=""/99}], 0x1000000000000009) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd1, 0x20, 0x2, 0x4, 0x40, 0x3, 0x3e, 0xffff, 0x1f4, 0x40, 0xc4, 0x87, 0x8, 0x38, 0x1, 0x7, 0xbfb5, 0x8}, [{0x2, 0xfffffe8b, 0x7fffffff, 0x1, 0x33, 0xd5, 0x4, 0x3}], "d7d20cdcad0a37344da36c0415cccf481a77886598d2b9dca3693e8f563704fcc82f8ca10c0656fa6851ce8ad2428a13da1073acc1bbbd6261b08e4e4f76c84e1d51c69980cf5bd1f979504d6d1bcd70f09a0ed69b37d37d3b703fee27f5f6f5ffb4957496c19dc00cd77f12f986ca3acf9f39ac15753a81f696530bec2e6d62a703f756b9f682527484bf194b49f59b45ed9eac630c31d2fcb60f4a706a575be69eef4f12b37577139534b31e0b9bd088b3faeb444b860edcac530c66fe42a2ae2021e4f3af6281e48cb3c2", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x644) [ 1996.203575] CPU: 1 PID: 10268 Comm: syz-executor.4 Not tainted 5.10.241 #1 [ 1996.205193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1996.206940] Call Trace: [ 1996.207491] dump_stack+0x107/0x167 [ 1996.208251] should_fail.cold+0x5/0xa [ 1996.209047] ? create_object.isra.0+0x3a/0xa30 [ 1996.210009] should_failslab+0x5/0x20 [ 1996.210809] kmem_cache_alloc+0x5b/0x310 [ 1996.211657] create_object.isra.0+0x3a/0xa30 [ 1996.212579] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1996.213645] kmem_cache_alloc_trace+0x151/0x320 22:21:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="feff00822db87c3d55efd9599e442eb7afdb49b36aca6ba79b96f004bd6d0886a18278e6d9821c9fc6c31f0c", @ANYRES32=r0, @ANYBLOB]) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x91) openat$hpet(0xffffffffffffff9c, 0x0, 0x2002, 0x0) r2 = creat(&(0x7f0000000000)='./file2\x00', 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200100000000000000000000000000027f00000100000000000000000000000000000070a200000000000a0000000000d7456c98e81196c6278716c0835070432c5c236322b69c9311dc175fd1cdf33303e319078f2c6a", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c7ba67cb7d38793daf5bb8e"], 0x134}}, 0x0) close(r2) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000000c0)={0x6200, 0x1f, 0x1}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="bce34510d8527213d252027f62fa048cff8850f972c239f267c267c9abd251de7cc1ae85da4f2e21f0b03f37b75ad3e5bc234a9e304695c89332d708f42a160c9e233786957d59a2da8ad9c9a6d7ee30c3a0d1233aaf478e8707dacc77bcbadbed9a4965762a884a8a4562b4660deebe4bbfac291a237c867a06b8f5292ee779c4a9d658e434614bc3c36a0177c16ef80b817804fcc7b384d2c51200c60d7b068a198e29512063a0a5cb437317f5ac214167f442779d8f52", @ANYRES16=r4, @ANYBLOB="0b0c02000000000000003f00000008000300513a5ff787b26fbdbd082a9d9b5bd0ad04f534ef7f5518bb5d2aa88d8a49acc1f24923145c999aa24ad6f41a34402bd10f81a5da53893bac0044a0b024b907735aadb93d0d96bdf218ff6f9ee49015c4e740700e4a89d209a4de5767568ed1c8ede1ca9f3adf99d764f06139aa0d86ab91e37ed5223b5eaff5af8b9135dea2468486bdcedf97a8450cb6055c72f86b8caac71db25859cd8d9697bcc357a2dafc3404710aaef73881677984d4be2f1c5701f6b076636089cc68acb2ff9d0655dca4cc33669e9dedab700ed2cb6e155dddb2072fd43df766ed4588f1dd670000000000000000", @ANYRES32=r6, @ANYBLOB="1c005e80080007000000000000000000000000000000c80000000000"], 0x38}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='c\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000426bd7000fbdbdf2510000000"], 0x14}}, 0x200400b0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) r7 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r7, 0x0, r1, 0x0, 0x200f5ef, 0x0) [ 1996.214612] ? ptmx_open+0x107/0x370 [ 1996.215524] ? pty_open+0x310/0x310 [ 1996.216282] alloc_tty_struct+0x95/0x8e0 [ 1996.217127] ? __do_SAK+0x30/0x30 [ 1996.217857] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1996.218866] ? pty_open+0x310/0x310 [ 1996.219620] tty_init_dev.part.0+0x20/0x610 [ 1996.220522] ? pty_open+0x310/0x310 [ 1996.221283] tty_init_dev+0x5b/0x80 [ 1996.222037] ptmx_open+0x116/0x370 [ 1996.222774] ? pty_open+0x310/0x310 [ 1996.223533] chrdev_open+0x268/0x6e0 [ 1996.224303] ? __unregister_chrdev+0x110/0x110 [ 1996.225263] ? fsnotify_perm.part.0+0x22d/0x620 [ 1996.226229] do_dentry_open+0x4b7/0x1090 [ 1996.227149] ? __unregister_chrdev+0x110/0x110 [ 1996.228146] ? may_open+0x1e4/0x400 [ 1996.228903] path_openat+0x19ba/0x2770 [ 1996.229736] ? path_lookupat+0x860/0x860 [ 1996.230583] ? __kernel_text_address+0x9/0x40 [ 1996.231512] ? unwind_get_return_address+0x55/0xa0 [ 1996.232533] ? lock_acquire+0x3ef/0x470 [ 1996.233364] ? lock_release+0x4d1/0x680 [ 1996.234306] ? lock_release+0x680/0x680 [ 1996.235194] ? __virt_addr_valid+0x346/0x5d0 [ 1996.236339] do_filp_open+0x190/0x3e0 [ 1996.237119] ? may_open_dev+0xf0/0xf0 [ 1996.237907] ? do_raw_spin_lock+0x121/0x260 [ 1996.238797] ? rwlock_bug.part.0+0x90/0x90 [ 1996.239676] ? _raw_spin_unlock+0x1a/0x30 [ 1996.240536] ? alloc_fd+0x2e7/0x670 [ 1996.241299] do_sys_openat2+0x171/0x4d0 [ 1996.242121] ? build_open_flags+0x6f0/0x6f0 [ 1996.243003] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1996.243996] ? wait_for_completion_io+0x270/0x270 22:21:17 executing program 0: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4882, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, @perf_config_ext={0x800}, 0x0, 0x5, 0x7, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x15}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000003c0)=0xffffffffffffffff) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x49) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, '\x00', 0x40, 0x0}, 0x18b6}}, 0x0, 0x0, 0xc, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd44034e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) syz_io_uring_setup(0x3e01, &(0x7f0000000140)={0x0, 0x100018d7, 0x4, 0x1, 0x376, 0x0, r3}, &(0x7f0000fec000/0x14000)=nil, &(0x7f0000fed000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000340)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000003bc0), 0x0, 0x20040080) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstatfs(r1, &(0x7f0000002e00)=""/4102) dup2(0xffffffffffffffff, r0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) [ 1996.245011] __x64_sys_openat+0x13f/0x1f0 [ 1996.246011] ? __ia32_sys_open+0x1c0/0x1c0 [ 1996.246874] ? ksys_write+0x1a9/0x260 [ 1996.247660] ? fpregs_assert_state_consistent+0xb9/0xe0 [ 1996.248760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1996.249838] do_syscall_64+0x33/0x40 [ 1996.250614] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1996.251657] RIP: 0033:0x7f213a2cab19 [ 1996.252415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1996.256186] RSP: 002b:00007f2137840188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1996.257764] RAX: ffffffffffffffda RBX: 00007f213a3ddf60 RCX: 00007f213a2cab19 [ 1996.259223] RDX: 0000000000000c02 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1996.260679] RBP: 00007f21378401d0 R08: 0000000000000000 R09: 0000000000000000 [ 1996.262155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1996.263617] R13: 00007ffde0b6feaf R14: 00007f2137840300 R15: 0000000000022000 VM DIAGNOSIS: 22:21:17 Registers: info registers vcpu 0 RAX=1ffff11001d479ec RBX=ffff8880092d1ad0 RCX=1ffffffff0acf557 RDX=000000b07e02c7c8 RSI=ffff88800918d430 RDI=ffff88800918d438 RBP=dffffc0000000000 RSP=ffff88806ce09c30 R8 =00000000000002bd R9 =ffff88800918d410 R10=ffff88800ea3cf50 R11=ffff88800918d500 R12=ffff8880092d1ae0 R13=ffff88800ea3cf40 R14=ffff88800918d400 R15=0000000000000001 RIP=ffffffff81216679 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f66cbcf3900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f66cb121d38 CR3=000000000b3da000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000417097f180000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000074 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822e3fc1 RDI=ffffffff879f71c0 RBP=ffffffff879f7180 RSP=ffff88806cf09c90 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000074 R13=0000000000000074 R14=ffffffff879f7180 R15=dffffc0000000000 RIP=ffffffff822e4018 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe199c7e700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fe199c7df78 CR3=000000000d3a2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=ffffffffffffffffffffffffffffff00 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000