tdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @empty}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback]}}}, @rthdrdstopts={{0x118, 0x29, 0x37, {0x62, 0x1f, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0xff, 0x7, [0x8, 0x7ff, 0x0, 0x6, 0xc63]}}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x19}}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @generic={0x0, 0x9c, "46ebe026d4476154ec12981e91fb7e732e8b537dbf0b90d687f62af5fc9cae7ccc4ec3ddf200c4b566dabff6dbe0404adf4521627004d2307f16570ddba44fcc1ad1fde96d275d95d75e1a01868f47f132295b578aa4657b09457723d661b175b9fa354b81af839d74d7090a5fe3645e3d342f124076c77b6c9efc794ec6bc09b49ca9c514df6a6dd77f535b9b879028d07a6c413c03476091a4ea3d"}, @ra={0x5, 0x2, 0xffff}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x1b0}}], 0x1, 0x2b3c8c6179c397a) [ 785.965298] audit: type=1326 audit(1761152842.465:997): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7362 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:07:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x0, 0x63, 0x7, 0xe0, 0x0, 0x1, 0x1000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0x2}, 0x5000, 0x4, 0x101, 0x7, 0x8, 0xfffffff7, 0x1f, 0x0, 0x1, 0x0, 0x75}, 0x0, 0x2, r3, 0x8) 17:07:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:07:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:07:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 800.069157] kauditd_printk_skb: 51 callbacks suppressed [ 800.069175] audit: type=1326 audit(1761152856.883:1049): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:07:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x0, 0x63, 0x7, 0xe0, 0x0, 0x1, 0x1000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000180), 0x2}, 0x5000, 0x4, 0x101, 0x7, 0x8, 0xfffffff7, 0x1f, 0x0, 0x1, 0x0, 0x75}, 0x0, 0x2, r3, 0x8) 17:07:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x80800, 0x50) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000001, 0x8010, r1, 0x75959000) 17:07:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:07:36 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:07:36 executing program 4: r0 = syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="757466382c6ff2aa3a0332ca2835b1dbbdc1"]) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000000)='./file0/file0\x00', 0x80, 0x100) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 17:07:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {r2}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000440)={0x0, r1, "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", "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"}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') renameat(r4, &(0x7f0000000080)='./mnt\x00', r3, &(0x7f00000001c0)='./mnt\x00') r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = pidfd_getfd(0xffffffffffffffff, r5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000002e00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xd4, "544d056968f26f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000001540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000000340)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {0x0, r10}], 0x5, "b53acec1810ff0"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {r13}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000440)={0x0, r12, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000054a00)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r11}, {r12}], 0x10, "dd533c909f5b4b"}) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) [ 800.099669] audit: type=1326 audit(1761152856.883:1050): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 800.120831] audit: type=1326 audit(1761152856.884:1051): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:07:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 800.146701] audit: type=1326 audit(1761152856.886:1052): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:07:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 800.174115] audit: type=1326 audit(1761152856.886:1053): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:07:37 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000004, 0x13, r0, 0xb2c84000) perf_event_open(&(0x7f0000000180)={0x1, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x40, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) 17:07:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x44200, 0x21) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4162173261cf7089, 0xa4) 17:07:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)={0x200, 0x41, 0x1}, 0x18) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0xfff, 0x80}}, './file0\x00'}) fcntl$getownex(r2, 0x10, &(0x7f0000000180)) [ 800.232753] audit: type=1326 audit(1761152856.886:1054): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 800.247002] audit: type=1326 audit(1761152856.888:1055): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 800.262332] audit: type=1326 audit(1761152856.888:1056): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 800.271083] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 800.285340] audit: type=1326 audit(1761152856.889:1057): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 800.286464] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 800.300668] audit: type=1326 audit(1761152856.889:1058): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7421 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:07:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 17:07:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:07:37 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:07:52 executing program 4: syz_io_uring_setup(0x10000, 0x0, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xc2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FIOCLEX(r0, 0x5451) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x9, 0x81, 0x0, 0x1ff}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000002ac0)=ANY=[@ANYBLOB="080500988400014637b5e6a174b7b2b317b4044a94da343dd489e684a04f4ca90665864272f2fedc47a9342fef8ad1fc88337e6391545bf80b8ea61a907e1120dcdd2930f3eace765860d93659a6dc77d049d1d90bf956808d12c853d595ab7ea7e76402b517c198dc7ffbdbb38ab65f84f5242824efb291f523ece2d8e79434f9fe77da5ead57c5f16fed9a43b14e466358a6b4c3a1a8361e8199db7e4116e6031e72ada1c25a85ea221f56", @ANYRES16, @ANYBLOB="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"], 0x508}, 0x1, 0x0, 0x0, 0x40000}, 0x48804) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r5, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="090001006a0f3d879e133d4ed539e3ac6e26e9e018e18358530c1109885bc471245b7ba77a847bec6f444bf4fef633404a9ef6f4d98446986a39066daab30514f7dd839c00ded704b8f11563b30626ea8789611f0064ad9489f262fa4939580a481bf12936f54729dc7d1ee34968599bb4000000000000000000", @ANYRES16, @ANYBLOB="280026bd704a826946", @ANYRES32=r4, @ANYRESOCT=r3], 0x28}, 0x1, 0x0, 0x0, 0x408c0}, 0x8054) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan0\x00'}) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x86) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) openat(r1, &(0x7f0000000000)='./file0\x00', 0x20840, 0x89) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000000c0)=ANY=[@ANYBLOB="01ffffffff2eb0eb123587254665c7d1950000010000001800000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00./&ile0\x00\x00']) openat(r3, &(0x7f0000000080)='./file0\x00', 0x141401, 0x0) 17:07:52 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:07:52 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 815.676878] kauditd_printk_skb: 59 callbacks suppressed [ 815.676898] audit: type=1326 audit(1761152872.495:1118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 815.684808] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 815.694786] audit: type=1326 audit(1761152872.495:1119): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:07:52 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:07:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:07:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) fcntl$dupfd(r2, 0x0, r2) 17:07:52 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$FIBMAP(r0, 0x1, 0xfffffffffffffffd) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) faccessat2(r3, &(0x7f0000000140)='./file1/file0\x00', 0x80, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000000)=0xffffe6be) [ 815.718807] audit: type=1326 audit(1761152872.496:1120): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 815.744058] audit: type=1326 audit(1761152872.508:1121): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 815.760722] audit: type=1326 audit(1761152872.508:1122): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 [ 815.780002] audit: type=1326 audit(1761152872.508:1123): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 815.801142] audit: type=1326 audit(1761152872.513:1124): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 815.806039] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 815.807712] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 815.810486] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 815.829083] audit: type=1326 audit(1761152872.513:1125): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:07:52 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:07:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 17:07:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x2, 0x1a0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) 17:07:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:usb_device_t:s0\x00', 0x22, 0x3) [ 815.853482] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 815.890744] audit: type=1326 audit(1761152872.513:1126): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:07:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 815.928639] audit: type=1326 audit(1761152872.513:1127): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7464 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 [ 815.974443] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 815.976407] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 815.978604] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:07:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0/file0\x00'}) openat(r2, &(0x7f00000000c0)='./file1\x00', 0x80, 0xa) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) 17:08:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 17:08:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000140)=0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r4, 0x9e46, 0x0) r5 = dup2(r4, r3) getdents64(r4, &(0x7f0000001400)=""/53, 0x35) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r4, &(0x7f0000000000)={0x40002001}, r5}, 0x81) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) syz_io_uring_submit(0x0, r2, &(0x7f00000000c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000080)={r6, r7+60000000}, 0x1, 0x0, 0x3}, 0xfffffff6) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r8, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$int_in(r8, 0x5452, &(0x7f0000000280)=0x6) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/cpuinfo\x00', 0x0, 0x0) openat(r10, &(0x7f00000003c0)='./file1\x00', 0x200, 0xa0) r11 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r11, &(0x7f0000000040)='./file0\x00', r9, &(0x7f0000000140)='./file1\x00', 0x4) syz_io_uring_setup(0x6c06, &(0x7f0000000180)={0x0, 0x77, 0x20, 0x0, 0x1e9, 0x0, r0}, &(0x7f0000ff2000/0x4000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000200)=0x0) syz_io_uring_submit(r1, r12, &(0x7f0000000240)=@IORING_OP_NOP={0x0, 0x1}, 0x0) [ 831.244660] kauditd_printk_skb: 44 callbacks suppressed [ 831.244679] audit: type=1326 audit(1761152888.061:1172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 831.260889] audit: type=1326 audit(1761152888.061:1173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:08:08 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:08:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) 17:08:08 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:08:08 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0xfb, 0x89, 0x0, 0x7, "6f06ab339b58147dcf5c5547fee5baef", "628f1f627d9497b46b1e43b4e8cb1ce2585da37c2ee8537ffa01ae9be96cf1fc0e2b62470a36964ec192b9e223298dda76ff2afbb8c4263145c9a681c84efca43eac0b8066ccaaa7d5183f1a26d3655cbcdefbbcc1473b2019de8d7e86aa66cc11c49074b08e2e53c8a2552b55d448c160b64ec1"}, 0x89, 0x2) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:08:08 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 831.287720] audit: type=1326 audit(1761152888.062:1174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 831.335415] audit: type=1326 audit(1761152888.062:1175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:08:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 831.358726] audit: type=1326 audit(1761152888.063:1176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:08:08 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 831.405703] audit: type=1326 audit(1761152888.063:1177): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:08:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 831.436506] audit: type=1326 audit(1761152888.069:1178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:08:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 831.480109] audit: type=1326 audit(1761152888.069:1179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 831.498961] audit: type=1326 audit(1761152888.069:1180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:08:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 831.519919] audit: type=1326 audit(1761152888.069:1181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7507 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:08:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) getsockname(r0, &(0x7f0000000080)=@nl, &(0x7f0000000000)=0x80) fallocate(r0, 0x4c, 0x81, 0x3) 17:08:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) 17:08:08 executing program 6: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@private2, @in6=@ipv4={""/10, ""/2, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000003c0)) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000440), 0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT=r3]) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000300)={{}, {0x1, 0x2}, [{0x2, 0x28fdbf594e8d5ebc, r0}, {0x2, 0x1, 0xee00}, {0x2, 0x1, r1}, {0x2, 0x5}], {0x4, 0x5}, [{0x8, 0x5, r2}, {0x8, 0x2, 0xee01}], {0x10, 0x2}}, 0x54, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000380)='./file1/file0\x00', 0x50) 17:08:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:08 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:08:22 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x105142, 0x20) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6, 0x20010, r0, 0xe3304000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000000)='./file0\x00', 0x80) 17:08:22 executing program 1: flistxattr(0xffffffffffffffff, &(0x7f0000000200)=""/201, 0xc9) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) r2 = signalfd(r0, &(0x7f0000000100)={[0x98]}, 0x8) connect$unix(r2, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) unlinkat(r3, &(0x7f0000000000)='./file1/file0\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000300)) lstat(0x0, &(0x7f00000007c0)) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) 17:08:22 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:22 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:08:22 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 845.289222] kauditd_printk_skb: 52 callbacks suppressed [ 845.289242] audit: type=1326 audit(1761152902.107:1234): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 845.295302] audit: type=1326 audit(1761152902.107:1235): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 845.311868] audit: type=1326 audit(1761152902.108:1236): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:08:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) 17:08:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) [ 845.347626] audit: type=1326 audit(1761152902.119:1237): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 845.387642] audit: type=1326 audit(1761152902.119:1238): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 845.419615] audit: type=1326 audit(1761152902.120:1239): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7562 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:08:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) 17:08:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) getdents64(r1, &(0x7f00000003c0)=""/4096, 0x1000) 17:08:22 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 845.459220] audit: type=1326 audit(1761152902.121:1240): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:08:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x420800, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000740)=ANY=[@ANYBLOB="0100002b01000000180000000254e5cd42757488227b05562ebc742f1462a9b61e0ac0346b5540d765", @ANYRES32=r1, @ANYBLOB="e96e0000000000002e2f66696c653000"]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1, {0x3}}, './file1\x00'}) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = fcntl$dupfd(r2, 0x0, r2) r5 = accept4(r2, 0x0, &(0x7f00000001c0), 0x0) sendmsg$inet6(r5, &(0x7f0000000700)={&(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x8}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000300)="9e3c6873123ba07bcc719a09580433f3bba9e8162bd1bfc94805e59cf56568dfab4ea34f254a3304fda7724b467815cb461ecb9c968d530006efb4e57f9c79b9619f4169170c4fb5819aa555308e", 0x4e}, {&(0x7f0000000380)="063fc0c98a30b704df4249161f27a63e25ebd31bb0bd5bc443a25a4261c5b7048dedf98db13fbbb509a11f0dfc0584f5a85c6ba1faa1ab0efb65e1a2a74c3798b3c434f35444dea7dc6c8576e7a353fa3d3367bc326d9ce227b70edfad5925151d483d7218e16008f2e8cfeacbaeec1f4c04a4811eddcf63fd3241ff1b0b0a7f9654315fe397c80ca847160f82cfdb14bd7c9a841220e9390e2762b6754d56916cb2cf8a70aacf5d0250145510a3173d009585dd7454cd823d42906c15485b", 0xbf}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000000440)="c46b1fcda1a0daeec7a177ccccb86164233e47c250124d3fcb6a27289cabbb901ace104f66219f47264b42c3be16a553ca555b3010507246868348ffb4491a1d838776ec1d12e4fb9b406442972eba91183857713f21581e4ebf0458c893611c979cbba07ef07ae11b57243f51fdbb792f488909a29050ef8b5fac09c2efc472637073f2b32c0cd57a88edb32d19c96ff1b8df92d4adda87472fe798cbd48c69e1cc066e3c9767905d4fe3a7d22938290f2b9b63854aab41c0d2dbb7fbcc1475d8e13b2d4fa99310a881eb241b49e35c7ab7e7d8d3e901030e675fa283428896afd87e48791d01c094e86e2f2fe0f3cba3", 0xf1}], 0x4, &(0x7f0000000540)=[@rthdr={{0x98, 0x29, 0x39, {0x16, 0x10, 0x2, 0xc1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x19}, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @broadcast}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @rthdr={{0x48, 0x29, 0x39, {0xf5, 0x6, 0x1, 0x2, 0x0, [@local, @rand_addr=' \x01\x00', @private2={0xfc, 0x2, '\x00', 0x1}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x200}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback}}}, @dstopts={{0x80, 0x29, 0x37, {0x0, 0xc, '\x00', [@calipso={0x7, 0x20, {0x3, 0x6, 0x3, 0x0, [0x20, 0x20, 0x5]}}, @enc_lim, @calipso={0x7, 0x38, {0x1, 0xc, 0x9, 0x5, [0x81, 0x5, 0x660, 0x1, 0x200, 0x7ff]}}, @ra]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}], 0x1b8}, 0x0) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) connect$unix(r4, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) [ 845.497658] audit: type=1326 audit(1761152902.122:1241): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 845.512211] audit: type=1326 audit(1761152902.122:1242): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7563 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 845.563660] audit: type=1326 audit(1761152902.124:1243): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7562 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:08:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) fcntl$dupfd(r2, 0x0, r2) 17:08:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x8000, 0x120) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) 17:08:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) 17:08:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) 17:08:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:38 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:08:38 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:08:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:08:38 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) 17:08:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) syz_io_uring_setup(0xa03, &(0x7f0000000080)={0x0, 0xfcbd, 0x20, 0x3, 0x35f, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)) syz_io_uring_submit(r3, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd_index=0x5, 0x0, 0x0, 0x0, 0x1}, 0x1) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) 17:08:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) [ 861.495307] kauditd_printk_skb: 55 callbacks suppressed [ 861.495329] audit: type=1326 audit(1761152918.313:1299): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7619 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 861.513927] audit: type=1326 audit(1761152918.326:1300): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 861.539945] audit: type=1326 audit(1761152918.326:1301): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:08:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file1', [{}, {0x20, '\xc7&\\f'}], 0xa, "c3f41345320660ea6f3621cce211b1c7fdf355e2f896edda6c1599c3d9bc007330196603f022703e033ce4531fcad36d2406481801905e68df805c76b3100f050aad4eaa3b3e1e3b2c89c56023c0ba2857a0d764200fd817661061fcaeb4f8664c87c77c56cdad67fda82a5e36894239f3288ea9e454aaa98d37ca3c6b552315e0ac085a1d7724ec4ab1ff52436a706c260e9aa2af19ce5c0366305d87fc8fa66c4663986d2e5f3b760a5915781b7e1d5d251bca851ec677e592ca691becbc7ab163ddb0b713c6a8a8080f480113b91d"}, 0xe1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x200980, 0xd8, 0x15}, 0x18) renameat2(r2, &(0x7f0000000040)='./file1\x00', r1, &(0x7f00000000c0)='./file1\x00', 0x4) 17:08:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) [ 861.565964] audit: type=1326 audit(1761152918.329:1302): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7619 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:08:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) 17:08:38 executing program 6: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2000005, 0x8810, r0, 0x10000000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000ac0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r4, 0x0, &(0x7f0000000a80)={&(0x7f0000000480)=@caif=@dbg, 0x80, &(0x7f0000000980)=[{&(0x7f0000000500)=""/178, 0xb2}, {&(0x7f00000005c0)=""/233, 0xe9}, {&(0x7f00000006c0)=""/124, 0x7c}, {&(0x7f0000000740)=""/118, 0x76}, {&(0x7f00000007c0)=""/83, 0x53}, {&(0x7f0000000840)=""/52, 0x34}, {&(0x7f0000000880)=""/195, 0xc3}], 0x7, &(0x7f0000000a00)=""/118, 0x76}, 0x0, 0x40000042, 0x1, {0x1}}, 0xafd4) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) symlinkat(&(0x7f0000000400)='./file0/file0\x00', r1, &(0x7f0000000440)='./file0\x00') lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), 0x1085800, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0xfff}}, {@posixacl}, {@access_any}, {@afid={'afid', 0x3d, 0x2381}}, {@access_any}, {@dfltgid={'dfltgid', 0x3d, r5}}, {@cache_fscache}, {@cachetag={'cachetag', 0x3d, '^'}}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@euid_gt={'euid>', r6}}, {@dont_appraise}, {@hash}, {@pcr={'pcr', 0x3d, 0x34}}, {@hash}, {@euid_gt}]}}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r7, 0xc0189378, &(0x7f0000000b40)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r7, @ANYRES32=r7, @ANYBLOB="000200088f46a134790c8ca02791b3c06e20c4c4d2cdcd182b161e6fffeedfc19d15ef8e77760e086a968219409af987a00c09a4a72ea66e33560d04b3796bd4771d4d37bf88"]) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x4) [ 861.622811] audit: type=1326 audit(1761152918.331:1303): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 861.634523] audit: type=1326 audit(1761152918.340:1304): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7619 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 861.655923] audit: type=1326 audit(1761152918.342:1305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 861.669790] audit: type=1326 audit(1761152918.342:1306): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 861.681141] audit: type=1326 audit(1761152918.344:1308): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7619 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:08:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) 17:08:38 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 861.700578] audit: type=1326 audit(1761152918.342:1307): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7616 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:08:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:08:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) 17:08:51 executing program 1: ioctl$CDROMRESET(0xffffffffffffffff, 0x5312) r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_WRITE={0x17, 0x4, 0x4007, @fd=r0, 0x6, &(0x7f0000000000)="9bc4f354ba17c518c3d7794c4835311f7a2a4eb4449660957302cfdd6cc66156a4c7f07d94bcecc880f5d061c650", 0x2e, 0x16, 0x1}, 0x5) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180)=@v1={0x1000000, [{0x5, 0xfffffff9}]}, 0xc, 0x2) 17:08:51 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {0x0, 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000140)) 17:08:51 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:08:51 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:08:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) [ 874.580660] kauditd_printk_skb: 46 callbacks suppressed [ 874.580679] audit: type=1326 audit(1761152931.398:1355): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7654 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 874.594189] audit: type=1326 audit(1761152931.409:1356): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7661 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 874.623773] audit: type=1326 audit(1761152931.410:1357): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7661 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 874.642823] audit: type=1326 audit(1761152931.422:1359): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7654 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 874.660053] audit: type=1326 audit(1761152931.423:1360): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7654 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 874.677656] audit: type=1326 audit(1761152931.424:1361): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7654 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:08:51 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r0, 0x540a, 0x0) 17:08:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 874.695603] audit: type=1326 audit(1761152931.424:1362): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7654 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:08:51 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x19d142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x10) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) renameat2(r1, &(0x7f0000000000)='./file1\x00', r2, &(0x7f0000000140)='./file2\x00', 0x4) [ 874.704282] audit: type=1326 audit(1761152931.424:1363): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7654 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 874.724212] audit: type=1326 audit(1761152931.419:1358): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7661 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 874.748391] audit: type=1326 audit(1761152931.425:1364): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7654 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:08:51 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:08:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) 17:09:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000100)=@ng={0x4, 0xf, "5a442ec6"}, 0x6, 0x1) 17:09:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x64840, 0x52) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) fcntl$setpipe(r1, 0x407, 0x80000000) 17:09:05 executing program 7: chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r3, 0x0, r3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) openat(r4, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r0, r2, 0x0, 0x80000001) r5 = signalfd(r2, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r5, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:09:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:05 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 888.326333] kauditd_printk_skb: 43 callbacks suppressed [ 888.326345] audit: type=1326 audit(1761152945.141:1408): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 888.329869] audit: type=1326 audit(1761152945.141:1409): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 888.340126] audit: type=1326 audit(1761152945.154:1410): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:09:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x1}) 17:09:05 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:09:05 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$EXT4_IOC_CHECKPOINT(r0, 0x4004662b, &(0x7f00000070c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x281, 0x16a) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000002800), 0x210000, 0x0) name_to_handle_at(r3, &(0x7f0000002840)='./file1/file0\x00', &(0x7f0000002880)=ANY=[@ANYBLOB="100500000000000000000080010000000100000003000000"], &(0x7f00000028c0), 0x400) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file1\x00', 0x4) clock_gettime(0x0, &(0x7f0000006f00)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f0000006d40)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/51, 0x33}, {&(0x7f0000000180)=""/169, 0xa9}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/209, 0xd1}, {&(0x7f00000000c0)=""/46, 0x2e}, {&(0x7f00000023c0)=""/206, 0xce}, {&(0x7f00000024c0)=""/192, 0xc0}, {&(0x7f0000000100)=""/1, 0x1}], 0x9, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x38}}, {{&(0x7f0000002640)=@abs, 0x6e, &(0x7f00000027c0)=[{&(0x7f00000026c0)=""/125, 0x7d}, {&(0x7f0000002740)=""/78, 0x4e}], 0x2, &(0x7f0000006f80)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001001a0002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xe8}}, {{&(0x7f0000002900), 0x6e, &(0x7f00000029c0)=[{&(0x7f0000002980)=""/12, 0xc}], 0x1, &(0x7f0000007100)=ANY=[@ANYBLOB="3400000002b603776700002000010000000100c825", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x38}}, {{&(0x7f0000002a40), 0x6e, &(0x7f0000005000)=[{&(0x7f0000002ac0)=""/4096, 0x1000}, {&(0x7f0000003ac0)=""/160, 0xa0}, {&(0x7f0000003b80)=""/172, 0xac}, {&(0x7f0000003c40)=""/4096, 0x1000}, {&(0x7f0000004c40)=""/237, 0xed}, {&(0x7f0000004d40)=""/232, 0xe8}, {&(0x7f0000004e40)=""/174, 0xae}, {&(0x7f0000004f00)=""/29, 0x1d}, {&(0x7f0000004f40)=""/12, 0xc}, {&(0x7f0000004f80)=""/122, 0x7a}], 0xa, &(0x7f00000050c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000005100)=@abs, 0x6e, &(0x7f00000053c0)=[{&(0x7f0000005180)=""/219, 0xdb}, {&(0x7f0000005280)=""/84, 0x54}, {&(0x7f0000005300)=""/139, 0x8b}], 0x3, &(0x7f0000005400)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f00000054c0)=@abs, 0x6e, &(0x7f0000006740)=[{&(0x7f0000005540)=""/248, 0xf8}, {&(0x7f0000005640)=""/4096, 0x1000}, {&(0x7f0000006640)=""/163, 0xa3}, {&(0x7f0000006700)=""/61, 0x3d}], 0x4, &(0x7f0000006780)=[@cred={{0x1c}}], 0x20}}, {{0x0, 0x0, &(0x7f0000006c80)=[{&(0x7f00000067c0)=""/18, 0x12}, {&(0x7f0000006800)=""/125, 0x7d}, {&(0x7f0000006880)=""/111, 0x6f}, {&(0x7f0000006900)=""/108, 0x6c}, {&(0x7f0000006980)=""/132, 0x84}, {&(0x7f0000006a40)=""/16, 0x10}, {&(0x7f0000006a80)=""/215, 0x97}, {&(0x7f0000006b80)=""/16, 0x10}, {&(0x7f0000006bc0)=""/163, 0xa3}], 0x9}}], 0x7, 0x40012020, &(0x7f0000006f40)={r5, r6+10000000}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000007240)=ANY=[@ANYBLOB="01000000010000002d00000064a513c1bc573ea0746b613c5814ae52d3333de68c6427fd4d7668f9370dad7b24602e05c60558202b6fd915c8271eb2e15540552453bba1af2a93f4b5f39af44abfb5d86d6eb401eb5961d660d90d9ab2a36afece61bf15d1615dcd30d22ca2936c", @ANYRES32, @ANYBLOB="05000000000000002e2f66696c653000"]) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000fffffdfd020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d4571082000000000000000000000000000000000000000000824a700900"/260]) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000980)={{}, r10, 0x18, @unused=[0xfff, 0x7f, 0x1ff, 0x1], @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000007140)={"55f15e7e368c949927ed66362aaa95e1", r10, 0x0, {0x8, 0x7fff}, {0x81, 0x800}, 0xa49e, [0xcd, 0x2, 0x5, 0x57, 0x6, 0x9, 0x100, 0x80000000, 0x80, 0x401, 0x1, 0x2, 0xffff, 0x7, 0x1ff, 0xfff]}) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@nodevmap}, {@noextend}, {@dfltgid={'dfltgid', 0x3d, r11}}, {@afid={'afid', 0x3d, 0x345}}]}}) lchown(&(0x7f0000000000)='./file1/file0\x00', r7, r11) [ 888.354475] audit: type=1326 audit(1761152945.155:1411): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 888.367019] audit: type=1326 audit(1761152945.156:1412): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 888.378177] audit: type=1326 audit(1761152945.162:1413): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 888.385335] audit: type=1326 audit(1761152945.181:1414): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:09:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x0, 0x1}) [ 888.398160] audit: type=1326 audit(1761152945.181:1415): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 888.403134] audit: type=1326 audit(1761152945.182:1416): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7691 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 888.406459] audit: type=1326 audit(1761152945.192:1417): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7695 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:09:05 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) mq_open(&(0x7f0000000000)='),\x00', 0x80, 0x12e, &(0x7f00000000c0)={0x80000000, 0x4, 0x3ff, 0x9}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x183) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) r2 = timerfd_create(0x0, 0x180800) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x9, 0x81, 0x2, 0x7, 0x3, 0x6, 0x4, 0x296, 0x40, 0x3a4, 0x0, 0x6, 0x38, 0x1, 0x3, 0xd68, 0x10}, [{0x4, 0x4, 0x2, 0x6, 0xa9, 0x2, 0x5, 0x4}], "3e1d8bfe50e380c0a1290ef26438ff3dbdf6be68d087bebfdfd0274532bce866c182fae523946759fead87408465d454d53117f880347f0b66e1dc2d39e5171e8b", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b9) 17:09:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) ioctl$VT_WAITACTIVE(r1, 0x5607) 17:09:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600), 0x0, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:05 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x0, 0x1}) 17:09:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x2) 17:09:05 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:09:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) fadvise64(r0, 0x1, 0x0, 0x4) 17:09:21 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:09:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:21 executing program 7: chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r3, 0x0, r3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) openat(r4, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r0, r2, 0x0, 0x80000001) r5 = signalfd(r2, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r5, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:09:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x60) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) 17:09:21 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f00000003c0)={{r0}, 0x2, &(0x7f0000000380)=[0x1f5, 0x101], 0x7, 0x2, [0x1, 0x0, 0x1]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='securityfs\x00', 0x0, &(0x7f00000002c0)='\xbd\x00') syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), &(0x7f0000000140)=0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r5, 0x9e46, 0x0) r6 = dup2(r5, r4) getdents64(r5, &(0x7f0000001400)=""/53, 0x35) syz_io_uring_submit(0x0, r3, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r5, &(0x7f0000000000)={0x40002001}, r6}, 0x81) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0xb5f, 0x3f}}, './file0/file0\x00'}) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000340)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r7, 0x0, 0x0, 0x0, {0x19c11cee1013b6d4}, 0x1, {0x0, r8}}, 0x2) renameat2(r2, &(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) getdents64(r9, &(0x7f0000000180)=""/105, 0x69) 17:09:21 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) read(r0, &(0x7f00000003c0)=""/70, 0x46) 17:09:21 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x0, 0x1}) [ 904.708207] kauditd_printk_skb: 45 callbacks suppressed [ 904.708224] audit: type=1326 audit(1761152961.526:1463): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 904.717334] audit: type=1326 audit(1761152961.526:1464): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 904.743966] audit: type=1326 audit(1761152961.532:1465): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 904.756525] audit: type=1326 audit(1761152961.538:1466): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 904.765985] audit: type=1326 audit(1761152961.539:1467): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 904.775161] audit: type=1326 audit(1761152961.539:1468): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x2c74, 0x7f, 0x6, 0x1, 0xfff}) 17:09:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) [ 904.832225] audit: type=1326 audit(1761152961.546:1469): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7740 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:09:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x1}) 17:09:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:21 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 904.870101] audit: type=1326 audit(1761152961.547:1470): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 904.903235] audit: type=1326 audit(1761152961.547:1471): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 904.945915] audit: type=1326 audit(1761152961.547:1472): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7739 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file1\x00', 0x80000020) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) 17:09:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSPTLCK(r0, 0x5420, &(0x7f00000000c0)=0x1) 17:09:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x6fe1, 0x69) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x42, 0x189) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa000, 0x20) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x242480, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x3, 0x1}, 0x4) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) connect(r0, &(0x7f0000000080)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0x0, 0x9e, "2db8ad6268a29212f443a27257676b5e62c74e04969ed65dc64be0ea5f7bd1fde6ef10e8d0a1ea56080529db02ebd37fcf8713fc087b06274744f3527c13ee", 0x18}, 0x80) renameat2(r3, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) [ 919.375746] kauditd_printk_skb: 46 callbacks suppressed [ 919.375758] audit: type=1326 audit(1761152976.194:1519): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 919.379536] audit: type=1326 audit(1761152976.197:1520): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 919.383314] audit: type=1326 audit(1761152976.201:1521): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 919.388142] audit: type=1326 audit(1761152976.201:1522): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 919.394093] audit: type=1326 audit(1761152976.204:1523): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:09:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f465", 0xf, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:36 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file2\x00', &(0x7f00000001c0), 0x10, &(0x7f0000000200)={'trans=unix,', {[{@cache_loose}], [{@uid_gt}, {@seclabel}, {@subj_type={'subj_type', 0x3d, '..-\xe2,)}%'}}, {@dont_measure}, {@permit_directio}, {@smackfsdef={'smackfsdef', 0x3d, '\''}}, {@obj_type={'obj_type', 0x3d, '-'}}, {@subj_type={'subj_type', 0x3d, ']?(.'}}, {@dont_appraise}, {@seclabel}]}}) openat(r0, &(0x7f0000000000)='./file1\x00', 0x400c02, 0x80) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000000c0)=ANY=[@ANYBLOB="01030018000000", @ANYRES32=r1, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00.\x00']) renameat2(r1, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x1) 17:09:36 executing program 7: chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r3, 0x0, r3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) openat(r4, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r0, r2, 0x0, 0x80000001) r5 = signalfd(r2, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r5, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:09:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) openat(r2, &(0x7f0000000000)='./file0\x00', 0x2a4002, 0x10) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000180)={0x7, 0x28, [0x3, 0x101, 0x8ce5, 0x2], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) 17:09:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x1}) 17:09:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TCXONC(r0, 0x540a, 0x0) 17:09:36 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 919.428981] audit: type=1326 audit(1761152976.204:1524): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 919.440641] audit: type=1326 audit(1761152976.204:1525): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 919.456588] audit: type=1326 audit(1761152976.205:1526): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 919.459403] audit: type=1326 audit(1761152976.205:1527): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) [ 919.484311] audit: type=1326 audit(1761152976.205:1528): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7784 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x3ff}}, './file1\x00'}) 17:09:36 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x0, 0x1}) 17:09:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x1dc) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000000)='./file1\x00', 0x88800, 0xc9) 17:09:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 17:09:50 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 934.137393] kauditd_printk_skb: 42 callbacks suppressed [ 934.137405] audit: type=1326 audit(1761152990.955:1571): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 934.141890] audit: type=1326 audit(1761152990.960:1572): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 934.149833] audit: type=1326 audit(1761152990.967:1573): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 934.165730] audit: type=1326 audit(1761152990.967:1574): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:09:50 executing program 7: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:09:50 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x0, 0x1}) 17:09:50 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), &(0x7f0000000140)=0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffbf2, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r3, 0x9e46, 0x0) r4 = dup2(r3, r2) getdents64(r3, &(0x7f0000001400)=""/53, 0x35) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r3, &(0x7f0000000000)={0x40002001}, r4}, 0x81) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000100)=@IORING_OP_SEND={0x1a, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000180)="493fd8258703244de0c0d69b676da7aa8c3cfb81501febebdc5f7d02992244451fc99029973886dc65b108b29e6c105f78679e4ef2cc804d157720db05b51c7424bb678d", 0x44, 0x10, 0x2}, 0x435) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r8, &(0x7f0000000080)='./file0\x00', 0x4) getdents64(r8, &(0x7f00000003c0)=""/4096, 0x1000) openat(r7, &(0x7f00000000c0)='./file1\x00', 0x200, 0x5c) renameat2(r7, &(0x7f0000000040)='./file0\x00', r6, &(0x7f0000000080)='./file1\x00', 0x1) 17:09:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x4010, r0, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000140)={0x0, 0x11ab, 0x2, 0x3, 0x383}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_FALLOCATE={0x11, 0xc9619bc8ed3cb0ed, 0x0, @fd_index=0x4, 0xa9, 0x0, 0x731, 0x0, 0x1}, 0xffffffff) 17:09:50 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 17:09:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 934.183739] audit: type=1326 audit(1761152990.972:1575): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 934.186729] audit: type=1326 audit(1761152990.972:1576): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:51 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x0, 0x1}) 17:09:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x1a000, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 934.228640] audit: type=1326 audit(1761152990.972:1577): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 934.250605] audit: type=1326 audit(1761152990.972:1578): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = syz_io_uring_complete(0x0) r3 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00', 0x5) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) [ 934.269618] audit: type=1326 audit(1761152990.972:1579): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 934.283085] audit: type=1326 audit(1761152990.972:1580): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7835 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:09:51 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:09:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x4) 17:09:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 17:09:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, 0x0) 17:09:51 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:09:51 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x810) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000044c0)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000045c0)={@rand_addr=' \x01\x00', 0x63, r2}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}, 0xffffffff}, 0x1c) r3 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000004400)={0x1, {{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, '\x00', 0x2d}, 0x4}}}, 0x88) sendmmsg$inet6(r3, &(0x7f00000042c0)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000200)="e2bcf3616d445d2bf09c0a873bda4da8d99d74ce8b3a04f920a810947f4c10223303c8d73108f25cc6eee3477b773ddc3fb5e88b19f062361cb293e6ee8ea53df824d1e606943cbd3ea3115814fc669393da25296849cf084f64ca045c3c7f3173dd99e4763c258cf2", 0x69}, {&(0x7f0000000300)="c64205151fe8545b67c4395681bee851e49511f76fdd59d8a8dfe2b43343a03408bd9d1f2bf91c29d3b5df558f", 0x2d}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000000340)}, {&(0x7f0000000380)="3dc60425b09d7a4e781f1864356a125f9578577b0e0fec30b85c461fe64df4829ca3c1758243497c945eb58da772a526ae44b37bef64e3f93c0ed3b4c1164a0b39ed85c2cca0dbad11", 0x49}, {&(0x7f0000000400)="37795a46a8c4bc2f2513d3505ef79fa1c0bc3022ddd6f1", 0x17}, {&(0x7f0000001c00)="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", 0x1000}, {&(0x7f0000000440)="e975255eff5be5eea088e76372239550572240b660902642f96560211cb384b26d7c506f590fd63df2b44294ea750b47ac38d34daa8f667da7ea449e4ee9f4459c0e68ff5a982ab52dd98c9454634f8a9ee1ce4edd8e0274804a3001c2a95d1ebf8681d2f76a56f6f2abbe", 0x6b}, {&(0x7f00000004c0)="2179d646de8629aef765151a82f2eb86779f67e90cc3dd06fcbf024370a50abed85601ce", 0x24}], 0x9, &(0x7f00000005c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x1f}}], 0x18}}, {{&(0x7f0000000600)={0xa, 0x4e21, 0xfffffffa, @dev={0xfe, 0x80, '\x00', 0x35}, 0x9}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000640)="e5a2615088714779693942", 0xb}, {&(0x7f0000000680)="69635441adf496232c966256e520d6db39c975f910b6ae935b7be94f71985e808878a538db9d6283f7d3f38c122b7dae877e3e7f8a6ecaff6f411fca7b19d63a177f94c1413b803d6002b0c5f1656e7e7212883ec76b761fea5233f916ceef7ec3643223aded9233fa2c6c1e077e02b4c3a02cab39d61c064567b8d4eb2a7b8db0f78512bc7e9aeabc3a0f34baef5f4ca6cc166f3305693396c3829dcef064de9f3918469b46d5a45c0eb80c1117d232b2252b3dae0ac19bc99436a4f9fa7c986d155a8886354b80ddc262e06f7b43df508f95687902a967ccf604f45db62acff9a805", 0xe3}, {&(0x7f0000000780)="c532638be88ea176cacf2e69c9039e8c865b39cb2ed35df4f6d64fe15028aeeb9bcfc33df0787f792075853b4ed620379bc530d393f84d91afdc8386d74fb49bbbdaf30ef32704232094caddda0d4bb4393c85127d5da184dc6c5b59e2917fbbbf4ae59db5abf9839822910441061e950ed7257842853778befc28a8c75bcc9cd24da95bb017ad9b26fc28e3012fd361300274b52a", 0x95}, {&(0x7f0000000840)="ca95a25ead120cbcfebbc9122cd5d749695480f006bb7ea6f3c048bb96f4225b7846b018efabbf8a27a9eaf653a8dfc755c4ffbbed9cf908c32513b61e8f4a04cc14c69d9a36845b4394e974249c21a0e4c036bcff4ecd2243b380375a8c969c54d074a5f2e4f218e378b6aa850668dd015bd0bb52625ef81b46045bf53e8494228900aa8dea7c74d264e1637a2539730f78c93b68c8c815d4a893a044ec3882bc901b8ff9262d2106dbbd99e2", 0xad}], 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="58000000000000002900000039000000840800800000000000000000000000000000000000000001fe8000000000000000000000000000bbfe8000000000000000000000000000aafc020000000000000000000000000000400000000000000029000000040000003304000000000000c2044e000000040103c91000000000000000000000ffffe0000001c20400000001000000000000002400000000000000290000003200000020010000000000000000000000000001", @ANYRES32=0x0, @ANYBLOB="000000006800000000000000290000003700000016090000000000000103000000041f070720000000020608010006000000000000009f000000000000001a4d00000000000005020000c910fe80000000000000000000000000001300010001d05ec2b50600"/112], 0x128}}, {{&(0x7f0000000a80)={0xa, 0x4e22, 0x394, @dev={0xfe, 0x80, '\x00', 0x16}, 0x7ee}, 0x1c, &(0x7f0000003e00)=[{&(0x7f0000002c00)="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", 0x1000}, {&(0x7f0000000ac0)="0e498d57246a7b908c28e47e067de385f1faf520def5e735d1030dbe95997fc827634194dce61ee866670943630d812c8f67997bd852e6e128b32641e29f24257615403ba3a0ed54bc07a8d866b27333f6bb67e7a4ece3ce49ff4595e2d1ab1b47c4925e6c5d5975ab8c23ca5231d0807c6003bc997f23ef9c05309275c95a8599cdcb02198722e81f8b48c7d500643112fc6ddefe8244de393784e7477037990ea88e06bb7de0f0de8c4339f828c1379992daac74aab6590690", 0xba}, {&(0x7f0000003c00)="f623a565803bff0f4bf607bbf8e12c7e4349f74fc789e73b70304037d2dbfb974c63cdefa4687d2bc7e045f78c355c80afe3282e257d2ac7c98fb0845f78802eb3d6a1fa4d35e9ceb9fe746d0f9e844a8ab1116df1183b5f48e375e99a8fbf5e1ba0010804e981aab8ea4c3474a26c8251012640372cacfb09a751a7cdeb32e1f8c46f70c41924afb9a244468931849c10bdd2b0", 0x94}, {&(0x7f0000003cc0)="e97bac2c1037831cc203808ea6166cb202669f307d7645a4a785ba3910501a3ba00b0357625ffc29f425cb8d9325d00c96bf35d922ca8ac8b27d03b356ed4c9d5ab0302f", 0x44}, {&(0x7f0000000b80)="ae9e987d8af80f09b800a385d89cb2574ccb4a7a3f178ce30d9c14a22a2fe95f82e2d9ebc5b506904d4905a4fd442b34816ea4cb42c38f1659", 0x39}, {&(0x7f0000003d40)="b34529e8df4089ba24d1fe04ecc48c6c741858ee9bb17f40e812478cfb1619837e99820f1f3fcf85508871cd1e6677b5874e83e02156785092c1ab347f235d439cfe0a882240371dd700d2986963df4dd07f05a082e635a0a55ad9b316f86b82ddb0229c8a37745be4335cd4faabfc830af4c97f9a979917f2b857fea1db756ad1ea8547d6d95ecacb1c3dcb36af640b3855f5b58a99a58972", 0x99}], 0x6, &(0x7f0000003e80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x515}}, @rthdr={{0x38, 0x29, 0x39, {0x2b, 0x4, 0x0, 0xb0, 0x0, [@mcast1, @private1={0xfc, 0x1, '\x00', 0x1}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x0, 0x0, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x40}]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x89, 0x0, '\x00', [@ra={0x5, 0x2, 0xfffc}]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x21, 0x2, '\x00', [@hao={0xc9, 0x10, @remote}, @pad1]}}}], 0xc0}}, {{&(0x7f0000003f40)={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, '\x00', 0x3f, 0x0}, 0x89a}, 0x1c, &(0x7f00000040c0)=[{&(0x7f0000003f80)="3f8df1bedfa5bacd213fdc036e096ba6ac9c40360ce9184f90a04e4879f60a610adcbc074701061fe3631e42c91cd0bc1745147418791db613fcaa43cb1964fe95df360665892e6d9f8ab9d4d9932084a35b0138cf49029049c357deded8b07a6ae67f1c3a1b9c890ab0869cc43bad076a6d4aae4e6e3b113fed41cd5adae9d7e1890a92608b6f37bc34782a7f92d9f4d3e5b413a53aa79177711ce1029236d0e6d6f7b62d3f4e8d19c8fedf00c90f9b37aa9d8458fbe5c21f", 0xb9}, {&(0x7f0000004040)="6200c1e6e7bdcda77d25a952eddbdb136bea741524ba643ea3e2a0718ab212f9134414ee451e86f0bed8b076111de48a5b6e4cecadb37ca8d77e41ed8cf6c559e80246170a8d3d71274f7c7f525c2c", 0x4f}], 0x2, &(0x7f0000004100)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}], 0x18}}, {{&(0x7f0000004140)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c, &(0x7f0000004280)=[{&(0x7f0000004180)="5d1b20394a6a5e9fe132c6bc2573b067476d1a15e84bc68218e3bbe1452a5638f064cda9287dbe779020ae006ba4767e61450838dd92f7b2b70f3214d8d6be6df8615649fc7905beecbf6b25fad7ceec1379c2fc8a4a8ea0279f01fdbd746d642a9d77e7e269ab4bc97e627009559edc0acc6359fa73679a4946e0026b2a88144d8570e7f382612e2a882481e9eec3a9dc83d30465b745351d6fed9d191daf2dc4ccd2ac6c2e93a70647f0c590b9128a777723ca0ada44fee42c54280cc2fdbae3afb6487879fac5170cbb4dc8f61506494fd80c585012b41e29d9361a2d9f23d68960d25f16fba447ca", 0xea}], 0x1}}], 0x5, 0x8c0) connect$bt_l2cap(r3, &(0x7f00000000c0)={0x1f, 0x0, @none, 0x0, 0x2}, 0xfffffffffffffe08) socket$inet6_udplite(0xa, 0x2, 0x88) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e20, 0x9, @mcast2, 0x1}, 0x1c) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x400, 0x4) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) [ 948.180356] kauditd_printk_skb: 47 callbacks suppressed [ 948.180367] audit: type=1326 audit(1761153004.998:1628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:04 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:10:04 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:04 executing program 7: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:10:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat(r0, &(0x7f00000002c0)='./file1\x00', 0x58000, 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000001000000182000005f329c2d5283f79d5efffcd6bc741030122060fa999408569420b57fb0b4144d316a3d8a096fcd475aa89eadaa9c3adc3a92d7581e277483b4dcbc182fc64f89e8816695384563fe05960b39518dfec15ee6a67f62b3af743bb99e443ecafa3ecbc83b482b11daf8fbe447aa6126bc3e35ba", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00./file0\x00\x00']) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x200403, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r5, &(0x7f0000000080)='./file0\x00', 0x4) renameat2(r4, &(0x7f00000000c0)='./file0\x00', r5, &(0x7f0000000140)='./file1\x00', 0x0) lgetxattr(&(0x7f0000000100)='./file1\x00', &(0x7f0000000000)=@known='user.incfs.size\x00', &(0x7f0000000180)=""/213, 0xd5) openat(r3, &(0x7f0000000280)='./file0\x00', 0x220003, 0x84) [ 948.199626] audit: type=1326 audit(1761153005.017:1629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 17:10:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, 0x0) [ 948.202232] audit: type=1326 audit(1761153005.018:1630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:05 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x7, 0x4, &(0x7f0000001380)=[{&(0x7f00000001c0)="f726a659a845e96c066e10ccabf94c33dc4ef016daed920b0d926494f6a48301857bdea76134692a599758a39bae18d45338369cd603e545387ceae40c0926f938a95f21424a6e4941379cafed44ac4836cda6424aaa33717f32ffa56c01d22739397e348aeb20f0735583e00a097833aeb741f9", 0x74, 0x401}, {&(0x7f0000000240)="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", 0x1000, 0x81}, {&(0x7f0000001240)="e10b74c0cb2421f406f59b9d6524bada883e33657919d8b5bdda1064202dbed620d95e1140d355ef4dfad6cd943e40d56f35a339f833c085d3f3a22ce2d61d5c6647bae71a3ec03fca562b1748e0d75245fea06cf9ff62a0b18701a8eb9da34113c5ce6c45a7e00789d08bc5333aa529cf6c321ebcc6c6ef3a4db4c43a5ec37b2062f5a55e8cf81366d9a5029a9dbab279ec3d1f4fd5e5e7d90031053a2216de0b236b555ecfad70973432f86f762ca55246747557045bb81a5227f676a483a964bc9ecaf5712329601318", 0xcb, 0x1}, {&(0x7f0000001340)="ab21", 0x2, 0xc9}], 0x1001800, &(0x7f0000001400)={[{@size={'size', 0x3d, [0x37, 0x37, 0x6b, 0x29, 0x78, 0x33]}}, {@size={'size', 0x3d, [0x32, 0x74, 0x31, 0x39, 0x65, 0x70, 0x0]}}, {}, {@huge_always}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@obj_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@dont_hash}]}) openat2(r2, &(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x100, 0x0, 0x8}, 0x18) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x10, 0x110, r0, 0x8000000) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x810, 0xffffffffffffffff, 0x10000000) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x5) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r7, &(0x7f0000000080)='./file0\x00', 0x4) lseek(r7, 0x100000001, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x6, 0x0, 0x0, 0x0, {}, 0x1, {0x0, r6}}, 0x800) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x5) [ 948.209617] audit: type=1326 audit(1761153005.018:1631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 948.222433] audit: type=1326 audit(1761153005.018:1632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 [ 948.233599] audit: type=1326 audit(1761153005.021:1633): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:10:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, 0x0) [ 948.245482] audit: type=1326 audit(1761153005.031:1634): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7886 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:10:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x2, 0x82100) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) [ 948.257390] audit: type=1326 audit(1761153005.040:1636): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 948.273324] audit: type=1326 audit(1761153005.040:1637): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 948.287972] audit: type=1326 audit(1761153005.040:1638): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7879 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:10:05 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 17:10:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0xed387d318b323cca, 0x7) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:10:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:05 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:05 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:10:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 17:10:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x107943, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:10:20 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 17:10:20 executing program 7: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:10:20 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:10:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000", 0x1a, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:20 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:20 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:10:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) mount$bind(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000100), 0x2, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) [ 963.532048] kauditd_printk_skb: 44 callbacks suppressed [ 963.532068] audit: type=1326 audit(1761153020.350:1682): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7929 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 963.546403] audit: type=1326 audit(1761153020.350:1683): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7929 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 963.585392] audit: type=1326 audit(1761153020.354:1684): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7929 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:20 executing program 4: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 963.599571] audit: type=1326 audit(1761153020.355:1685): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7929 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x104) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000180)=[{&(0x7f0000000140)="43c657e5a49b300554e9e626a014e03ac7", 0x11, 0x6f}], 0x40, &(0x7f00000001c0)={[{@lazytime}, {@dioread_lock}, {@errors_continue}, {@noquota}, {@noload}], [{@context={'context', 0x3d, 'system_u'}}]}) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2f6d65762f6d1cb6e34a5bcfee170d643000"], &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='cifs\x00', 0x4009, &(0x7f0000000300)='ext3\x00') renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) [ 963.613214] audit: type=1326 audit(1761153020.371:1686): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7930 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 963.627723] audit: type=1326 audit(1761153020.374:1687): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7930 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:10:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 963.643716] audit: type=1326 audit(1761153020.376:1688): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7929 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 963.672392] audit: type=1326 audit(1761153020.378:1689): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7930 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:10:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x399400, 0x44) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) memfd_create(&(0x7f0000000100)='trusted.overlay.redirect\x00', 0x3) memfd_create(&(0x7f0000000180)='trusted.overlay.redirect\x00', 0x7) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) syz_io_uring_setup(0x1841, &(0x7f0000000340), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000080)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@caif=@dbg, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/58, 0x3a}, {&(0x7f0000000280)=""/22, 0x16}, {&(0x7f00000003c0)=""/240, 0xf0}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001580)=""/171, 0xab}, 0x0, 0x10021, 0x1, {0x1}}, 0xb23) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) [ 963.687186] audit: type=1326 audit(1761153020.379:1690): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7930 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:10:20 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 963.710485] audit: type=1326 audit(1761153020.379:1691): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7930 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:10:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r0, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r4, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r3, &(0x7f00000004c0), 0x10000) 17:10:20 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) (fail_nth: 1) [ 963.817614] FAULT_INJECTION: forcing a failure. [ 963.817614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 963.819028] CPU: 0 PID: 7967 Comm: syz-executor.4 Not tainted 5.10.245 #1 [ 963.819809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 963.820752] Call Trace: [ 963.821065] dump_stack+0x107/0x167 [ 963.821486] should_fail.cold+0x5/0xa [ 963.821942] _copy_to_user+0x2e/0x180 [ 963.822387] simple_read_from_buffer+0xcc/0x160 [ 963.822931] proc_fail_nth_read+0x198/0x230 [ 963.823433] ? proc_sessionid_read+0x230/0x230 [ 963.823961] ? security_file_permission+0xb1/0xe0 [ 963.824518] ? proc_sessionid_read+0x230/0x230 [ 963.825051] vfs_read+0x228/0x620 [ 963.825461] ksys_read+0x12d/0x260 [ 963.825878] ? vfs_write+0xb10/0xb10 [ 963.826318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 963.826923] ? syscall_enter_from_user_mode+0x1d/0x50 [ 963.827524] do_syscall_64+0x33/0x40 [ 963.827956] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 963.828556] RIP: 0033:0x7ff75b1ee69c [ 963.828984] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 963.831136] RSP: 002b:00007ff7587b1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 963.832012] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff75b1ee69c [ 963.832832] RDX: 000000000000000f RSI: 00007ff7587b11e0 RDI: 0000000000000004 [ 963.833652] RBP: 00007ff7587b11d0 R08: 0000000000000000 R09: 0000000000000000 [ 963.834476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 963.835290] R13: 00007ffe6962702f R14: 00007ff7587b1300 R15: 0000000000022000 17:10:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) syz_io_uring_setup(0x1841, &(0x7f0000000340), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000080)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x5, 0x3, 0x0, 0x3f, 0x0, 0x1}, 0x8) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000100)='./file0\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) openat(r4, &(0x7f00000000c0)='./file1\x00', 0x309101, 0x9) 17:10:34 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:10:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r0, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r4, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r3, &(0x7f00000004c0), 0x10000) 17:10:34 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) (fail_nth: 1) 17:10:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) 17:10:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @in_args={0x2}}, './file1\x00'}) [ 977.302854] kauditd_printk_skb: 48 callbacks suppressed [ 977.302868] audit: type=1326 audit(1761153034.121:1740): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7984 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 977.307180] FAULT_INJECTION: forcing a failure. [ 977.307180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 977.307244] audit: type=1326 audit(1761153034.121:1741): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7984 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 977.309871] CPU: 1 PID: 7981 Comm: syz-executor.0 Not tainted 5.10.245 #1 [ 977.314612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 977.316878] Call Trace: [ 977.317501] dump_stack+0x107/0x167 [ 977.318365] should_fail.cold+0x5/0xa [ 977.319265] _copy_to_user+0x2e/0x180 [ 977.320166] simple_read_from_buffer+0xcc/0x160 [ 977.321250] proc_fail_nth_read+0x198/0x230 [ 977.322266] ? proc_sessionid_read+0x230/0x230 [ 977.323324] ? security_file_permission+0xb1/0xe0 [ 977.324453] ? proc_sessionid_read+0x230/0x230 [ 977.325513] vfs_read+0x228/0x620 [ 977.326351] ksys_read+0x12d/0x260 [ 977.327178] ? vfs_write+0xb10/0xb10 [ 977.328065] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 977.329284] ? syscall_enter_from_user_mode+0x1d/0x50 [ 977.330493] do_syscall_64+0x33/0x40 [ 977.331354] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 977.332537] RIP: 0033:0x7f4d856e269c [ 977.333402] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 977.337666] RSP: 002b:00007f4d82ca5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 977.339436] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4d856e269c [ 977.341085] RDX: 000000000000000f RSI: 00007f4d82ca51e0 RDI: 0000000000000004 [ 977.342748] RBP: 00007f4d82ca51d0 R08: 0000000000000000 R09: 0000000000000000 [ 977.344395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 977.346040] R13: 00007ffc5799caef R14: 00007f4d82ca5300 R15: 0000000000022000 17:10:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 977.356244] audit: type=1326 audit(1761153034.173:1742): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7984 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 977.360590] audit: type=1326 audit(1761153034.174:1743): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7984 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 977.375360] audit: type=1326 audit(1761153034.174:1744): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7984 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 977.403879] audit: type=1326 audit(1761153034.178:1745): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7973 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x2, 0x0) [ 977.440003] audit: type=1326 audit(1761153034.178:1746): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7973 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 977.460454] audit: type=1326 audit(1761153034.182:1747): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7973 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x3b6dc8f973718fca) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:10:34 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 977.494747] audit: type=1326 audit(1761153034.183:1748): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7973 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 977.529661] audit: type=1326 audit(1761153034.183:1749): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=7973 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 17:10:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b2f, 0x0) 17:10:34 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x2, &(0x7f0000000000)) 17:10:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:34 executing program 6: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000140)=""/145, 0x91) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:10:47 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:10:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r0, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r4, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r3, &(0x7f00000004c0), 0x10000) 17:10:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b30, 0x0) 17:10:47 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:10:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x28) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:10:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) write$binfmt_elf64(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0xfe, 0x7f, 0x4, 0x40, 0x2, 0x6, 0x80000001, 0x107, 0x40, 0x1a0, 0x10001, 0x5, 0x38, 0x2, 0x9, 0x8, 0x3b7d}, [{0x4, 0x8001, 0xb3, 0x7, 0xbbe6, 0x5, 0x1ff, 0xffff}], "86f1ed55388cfb0e94512ce6554745e18989badfe9e1bf2c691ea12dee36f3224c28b536e626840ba064b2d0f090cededcb44e37f122d9a526bbcc6496079a2c730cc429281b356d971b81fbe67fef3bceaee9d34ff4f3f883a342f9949c7e2e5fc0eaa2f249a74043973f516f0041ccbb9330247de3e21bf6c6276e5a4ae44cff3d566789a793380de764cbd8a624814d3ebedcafc2a276d6230f09a12c84163a97dfb39f", ['\x00', '\x00', '\x00', '\x00']}, 0x51d) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xa, 0x0, 0x0, 0x1, [@generic="487fec864b24"]}]}, 0x28}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r5, {r4}}, './file0\x00'}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r5) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, r7, 0x2, 0x70bd2c, 0x25dfdbff}, 0x14}}, 0x40090) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xcc, r7, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1ff, @private0, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e20, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xde}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8084}, 0x100) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x12c, r7, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x108, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa486}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x340}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x24b6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5e42}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x99}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffc01}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff7}]}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x2000054}, 0x4040) 17:10:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 990.977486] kauditd_printk_skb: 61 callbacks suppressed [ 990.977511] audit: type=1326 audit(1761153047.795:1811): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 990.991261] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 990.992794] audit: type=1326 audit(1761153047.805:1812): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b2f, &(0x7f0000000000)) 17:10:47 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 991.030460] audit: type=1326 audit(1761153047.806:1813): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:10:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x14c01, 0x6) fcntl$setsig(r1, 0xa, 0xe) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file1\x00', 0x4) getdents64(r3, &(0x7f0000000080)=""/142, 0x8e) 17:10:47 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b30, &(0x7f0000000000)) 17:10:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b31, 0x0) [ 991.073109] audit: type=1326 audit(1761153047.806:1814): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 991.078795] audit: type=1326 audit(1761153047.807:1815): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 [ 991.092363] audit: type=1326 audit(1761153047.807:1816): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:10:47 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) creat(&(0x7f0000000000)='./file0\x00', 0x10d) [ 991.111664] audit: type=1326 audit(1761153047.807:1817): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:10:47 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 991.141655] audit: type=1326 audit(1761153047.807:1818): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 991.148928] audit: type=1326 audit(1761153047.807:1819): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:10:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa400, 0xa4) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat(r2, &(0x7f00000000c0)='./file2\x00', 0x240, 0xc6) [ 991.190883] audit: type=1326 audit(1761153047.807:1820): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8017 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 17:10:48 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b31, &(0x7f0000000000)) 17:11:01 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1004.768911] kauditd_printk_skb: 63 callbacks suppressed [ 1004.768933] audit: type=1326 audit(1761153061.586:1884): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:01 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:11:01 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:01 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x325742, 0x25) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x5, 0x0, @fd_index=0x2, 0x7ea5, 0x0, 0x5, 0x5, 0x0, {0x0, r2}}, 0x4f2) openat(r1, &(0x7f0000000200)='./file1\x00', 0x14201, 0x10e) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) linkat(r3, &(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file1\x00', 0x400) link(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='./file0\x00') 17:11:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000280)=0x1e) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000f600000018000000", @ANYRES32=r0, @ANYBLOB="faffffff000000002e2f66696c653000"]) perf_event_open(&(0x7f0000000200)={0xe78587088d48fdc9, 0x80, 0x4, 0x21, 0x2, 0x2, 0x0, 0x0, 0x80000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x80, 0x6, 0x396, 0x3, 0x0, 0x1ce, 0x44a, 0x0, 0x471}, 0x0, 0xa, r2, 0xb) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) r4 = socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='\x00', &(0x7f0000000300), 0x800000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access', 0x3d, r5}}, {@privport}, {@cache_mmap}, {@version_L}, {@debug={'debug', 0x3d, 0xc560}}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@cachetag={'cachetag', 0x3d, 'ext4\x00'}}, {@access_any}, {@aname={'aname', 0x3d, 'ext4\x00'}}, {@cachetag={'cachetag', 0x3d, '*'}}], [{@pcr={'pcr', 0x3d, 0x2b}}, {@euid_lt={'euid<', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}}) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x40001, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2f}}}, 0x1c) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x6, 0x9, 0x0, 0x6, 0x0, 0xffffffff, 0xc10, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x3, 0xffff}, 0x8220, 0xb967, 0x7fff, 0x8, 0xce, 0xd5c1, 0xb, 0x0, 0x7, 0x0, 0x400}, 0x0, 0x4, r8, 0x1) renameat2(r7, &(0x7f0000000040)='./file0\x00', r6, &(0x7f0000000140)='./file1\x00', 0x4) 17:11:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b32, 0x0) [ 1004.782892] audit: type=1326 audit(1761153061.587:1885): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1004.812116] audit: type=1326 audit(1761153061.589:1886): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1004.851301] audit: type=1326 audit(1761153061.589:1887): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b33, 0x0) 17:11:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b32, &(0x7f0000000000)) [ 1004.884100] audit: type=1326 audit(1761153061.597:1888): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1004.907000] audit: type=1326 audit(1761153061.599:1889): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1004.946728] audit: type=1326 audit(1761153061.599:1890): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:01 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:01 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x5c5182, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x4d8c00, 0x53) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r3 = dup(r0) renameat2(0xffffffffffffff9c, &(0x7f0000000a00)='./file1\x00', r3, &(0x7f00000009c0)='./file0\x00', 0x4) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000800), 0x4c100, 0x0) sendfile(r2, r4, &(0x7f0000000840)=0x9, 0x4f5f) vmsplice(r1, &(0x7f0000000740)=[{&(0x7f0000000140)="31987117463506c2e125eeca9103fb99ff76a4704b9533de2eedd388ed1bf91b3d0411b139e2935820a4a384ba7c9dcb4be96523b7b089ef6a1c01ded58a540ff0985dbd1ee69758996a30aeee5e02f6e4f3ffd08cfc", 0x56}, {&(0x7f00000001c0)="586193646fdc41ae1f0c2c4e9c17ee1dde9772b21df20b758ea214bad3f4b143f7ba08c7c56ad88d36eaf7c5890f0aa0145d7485625a397b3ced0491b336dd76ffb79d050d08e86306e38626a505b7f5ffc33070ac59e2f0e580bfa8674314db49cd", 0x62}, {&(0x7f0000000240)="1eb1f27894ddfb976f784d1f082d1cb5171f18a4b4bfbf6beee4cdd047ca1845b2a78e889d12d55277f3ff35c072cf6fadd645311464a710f1e94516a791ba7693bd44d2d8d9d7920ebe1de7af20c45925d7b4dbe3f4d4bc0be6528ee0666d9ebb2519eac0a158a05625025ae7c161521667dfbe52309fcdb21369bd7c9dbda3502bed07be97d24e2579c7191d38289608d2719029683726074fa57883f8f4e88d3c1ca98cc571c32eb8d7dca60c27d999dac5d229356c842d380cc122433cefc143d73c686e5e53927574ce4520f617dc6c9b90d73c2d8aefa94782767b6566", 0xe0}, {&(0x7f0000000340)="d1fd23a8bb4a7b0f657c5da9621f558745b9dbc42213f0df79266a17729e6edf4db5cbfaa06acab76b8cf7fc53ee53bc235d8ec3196324aa632b3e1a2df14ad5a64bf6f483ff5c4a605ea2d6963d78328beb668320a8747ec1abbc82762ec35967d2d95983811dbb94a05ceae699bd81d00c2f9a66cf6ac8220ff76ac815c811f17f56c4a865f357b651f2e6d0d2055ece397635cf54bb9c02a6407e9b", 0x9d}, {&(0x7f0000000400)="a4936f69b47bf33f280e411c4968253b72a6c0828e1c75faf91f3ee82eec396be3a7709d3ee9e975944315fbef828db3c11ad75aa5a25ca5aa65942720f4d7ded6", 0x41}, {&(0x7f00000000c0)="00dd4edcaf45dcbfdabb0d2c3d60201ee843fd9275ac1aab", 0x18}, {&(0x7f0000000480)="05f84ef622c5e38914783064d9675d461f9da289209943add370f9e1cd86a3cd7593710778db1030cf76ecd9870a7e14fd81616f9eef52aec2727453bc662b7b8aa61b2317d223033808d7b1a174666d87c2abddaa2b60755c02fd64b0de7fa17f1612120b88d79e7342f21c68db581ea9da267a419c975c678818fb3d08988c3616ae08c709de1d8ad0502bac81e82e6dc6b13fc1b28d32c39e8069389977608dfce10fc8acc353f15c7575b02b71545e56083b805b9dc009e7b9c8b7af06acf7134b7d53904d395da919e397", 0xcd}, {&(0x7f0000000580)="144ed77c2da9243c7756fbb0b4b6159b7774637278b1caa5b78d6bc6e63e87d49531072431cb13460c594c02800f06a815ead4326e43610a17afadd5b1b31e985d2e61851c2a1488019870254d66a47aefac62144d4e511a8a797c20ba666069a09ec9dd8ca6141cf2f2ba29c8494d555065efc0c33165c67c07926b6b99d3c70c62e348ad077c6b86ae833d1703a0043e84e65398f5a670dbd85fa7c6d03406e6", 0xa1}, {&(0x7f0000000640)="341f79b71799ac098e074a376c5ea5211bab664fc8f380144e2c5b54af93a471212a2e8980b50e6a599eccbdd5b9bca6c2c10fd893224157007512aaec7962642f712042159c18f7ecdfeecbbb302f62bf01785955aa44a3af506c887d0342e6e422fa155c6ca083abadd6169394a49b25929c7bf2c848e18086bc736ab1ea9841cc6c66a85dcee962f56bc97929a071d8acbe536e1a9a684ce835411bbbaa56c08ab95b0336ee96039ded897b059efec30613891d44ad6b14d0f4583b0983bdb9f0abf7c4ef0da441ae3e3f402402e1de69f4f0cc38", 0xd6}], 0x9, 0xc) mount(&(0x7f0000000880)=ANY=[@ANYBLOB="0000000000000000004181f1"], &(0x7f00000008c0)='./file1\x00', &(0x7f0000000900)='omfs\x00', 0x0, &(0x7f0000000940)='[!\x03\x00') renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4) [ 1004.955423] audit: type=1326 audit(1761153061.599:1891): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1004.979925] audit: type=1326 audit(1761153061.599:1892): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8066 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1004.989778] audit: type=1326 audit(1761153061.611:1893): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8064 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:11:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b34, 0x0) 17:11:01 executing program 6: prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:11:14 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:11:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b35, 0x0) 17:11:14 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b33, &(0x7f0000000000)) 17:11:14 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:11:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/4\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x20000, 0x31) 17:11:14 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) sendmsg$inet6(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000400)="8494aff1a0a0a757a62779d8212f310a4504a50d4ae248f57cba45ff74ab4ac1c38da479b98d9b6874f3eb49f66541f396ea1b679e49b02cb05cca324480d0cade9c50dc992ee716291ccfb423817e8eeb25cba0bde60c4d242928f18175a2cca1e92d861cfe54d9bce88df5197782e5122fa09c61a506aaac5d41112da31ead61ced144818a574cf811efdf46244ab041af2f9c2861df14e1c0ea8065a28635a63761d13ddf2f10f87e55b63341074ea0ae949c0ef0a3913296df3e832edbaf", 0xc0}, {&(0x7f00000004c0)="ab7ac75bf4358cdda34d257625a57bbec73afafc1a80614a9c7136fd35558577f1ec6022e01aa5ab8d389f30e1d115d7745f25d34c01a44ee1c9b603aa93d164b9d7934889e84cd69ed2c71af1c06d2ad46d25e7140c56a1cac7f045eeb53fed670d20a7a3c94c0dc8f4a2093862514ae90a445d445c411d3162b1a4d3ba3495ae4507827d2805f5a2ff0546dbc8437683abbb647396204614e413de97fee394def68d7cfffd28", 0xa7}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="f5ffffff44ffffff2997464db3e54bf1affd3410150a88000000454da35404141886000000"], 0x18}, 0x20000010) r3 = fcntl$dupfd(r1, 0x406, r0) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x420000, 0x0) recvfrom$inet6(r0, &(0x7f0000000300)=""/225, 0xe1, 0x22041, &(0x7f0000000240)={0xa, 0x4e20, 0x1000, @remote, 0x9}, 0x1c) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/221, 0xdd) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) [ 1018.210257] kauditd_printk_skb: 141 callbacks suppressed 17:11:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1018.210278] audit: type=1326 audit(1761153075.028:2035): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000080)='./file0\x00', 0x200000, 0x100) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat(r2, &(0x7f0000000000)='./file1\x00', 0x18402, 0x84) renameat2(r2, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) [ 1018.230960] audit: type=1326 audit(1761153075.028:2036): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1018.251109] audit: type=1326 audit(1761153075.029:2037): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1018.296064] audit: type=1326 audit(1761153075.029:2038): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1018.299938] audit: type=1326 audit(1761153075.029:2039): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1018.303370] audit: type=1326 audit(1761153075.029:2040): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1018.306986] audit: type=1326 audit(1761153075.030:2041): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1018.320386] audit: type=1326 audit(1761153075.030:2042): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b34, &(0x7f0000000000)) [ 1018.334801] audit: type=1326 audit(1761153075.030:2043): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:15 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x82) [ 1018.345415] audit: type=1326 audit(1761153075.030:2044): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8116 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4f9ca6ea04 code=0x7ffc0000 17:11:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b36, 0x0) 17:11:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b35, &(0x7f0000000000)) 17:11:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x614802, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={0x280283, 0x68, 0x6}, 0x18) renameat2(r1, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x3) 17:11:15 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:31 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:11:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24100, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x8}}, './file1\x00'}) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:11:31 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b36, &(0x7f0000000000)) 17:11:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/200, 0xc8) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) renameat2(r2, &(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file1\x00', 0x6) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x20800, 0x113) 17:11:31 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:11:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b37, 0x0) 17:11:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1034.573247] kauditd_printk_skb: 45 callbacks suppressed [ 1034.573266] audit: type=1326 audit(1761153091.391:2090): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b37, &(0x7f0000000000)) [ 1034.587074] audit: type=1326 audit(1761153091.391:2091): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1034.616875] audit: type=1326 audit(1761153091.392:2092): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1034.632672] audit: type=1326 audit(1761153091.405:2093): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:31 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3a, 0x0) [ 1034.684167] audit: type=1326 audit(1761153091.405:2094): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:11:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {0x0, 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1034.735675] audit: type=1326 audit(1761153091.406:2095): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1034.771623] audit: type=1326 audit(1761153091.406:2096): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:31 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) openat(r0, &(0x7f0000000380)='./file2\x00', 0x46e2, 0x182) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='.\x00', r1, &(0x7f0000000140)='./file1\x00', 0x1) 17:11:31 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1034.815137] audit: type=1326 audit(1761153091.410:2097): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3a, &(0x7f0000000000)) [ 1034.860851] audit: type=1326 audit(1761153091.410:2098): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:31 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) [ 1034.896103] audit: type=1326 audit(1761153091.410:2099): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8152 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:11:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x4000}, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000140)=0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r2, 0x9e46, 0x0) r3 = dup2(r2, r1) getdents64(r2, &(0x7f0000001400)=""/53, 0x35) syz_io_uring_submit(0x0, r0, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r2, &(0x7f0000000000)={0x40002001}, r3}, 0x81) syz_io_uring_submit(0x0, r0, &(0x7f00000003c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x6, 0x0, 0x1, 0x0, &(0x7f0000000340)="46acabbe2ad3e5cdf628971063e635156376dad6936f020e89e90e2a55198e9f60ee900a475a6c6717474e1403b35734064152871ad8d3af22cd69729f4fb32268", 0xff, 0x0, 0x1}, 0xffffffff) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r5, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$inet6(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x2010, r7, 0x192b2000) 17:11:45 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x2000, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x2, 0x20) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file0\x00') renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) 17:11:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:11:45 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) [ 1048.900474] kauditd_printk_skb: 44 callbacks suppressed [ 1048.900505] audit: type=1326 audit(1761153105.718:2144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8204 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1048.935706] audit: type=1326 audit(1761153105.731:2145): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8204 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:11:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x50, 0x20, 0x7, 0x9, 0x3, 0x3, 0x88, 0x13f, 0x40, 0x313, 0x5, 0x7ff, 0x38, 0x2, 0xff00, 0x7fff, 0xff36}, [{0x60000000, 0x80000001, 0x6, 0x9, 0x9, 0x7ab, 0x1f, 0x2}], "6cd806761a4512ad138371deafdadf8ca3c6f3da9d2b813358e0434ca43cfaddfc6388cbb028dc34050e6a6c2175f90c05ae4ff64b37e19827838831b3685b3df3365fd5e31d698387822de51a3549e5e6e29a2d8e2503f5afe71beedeb336093442dbdb0ec9d0373ad1bb5e39750a12064433", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7eb) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:11:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3b, 0x0) 17:11:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3b, &(0x7f0000000000)) 17:11:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3c, &(0x7f0000000000)) 17:11:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3c, 0x0) [ 1048.963972] audit: type=1326 audit(1761153105.736:2146): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8204 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2600, 0x19) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) 17:11:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1049.007116] audit: type=1326 audit(1761153105.736:2147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8204 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:11:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b3d, &(0x7f0000000000)) [ 1049.015268] audit: type=1326 audit(1761153105.736:2148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8204 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1049.019674] audit: type=1326 audit(1761153105.751:2149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8212 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1049.022940] audit: type=1326 audit(1761153105.751:2150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8212 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:11:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, &(0x7f00000002c0), 0x20, &(0x7f0000000180)={[], [{@fsmagic={'fsmagic', 0x3d, 0x10001}}, {@permit_directio}, {@fsname={'fsname', 0x3d, 'func'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@pcr={'pcr', 0x3d, 0x23}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 1049.049603] audit: type=1326 audit(1761153105.751:2151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8212 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1049.055735] audit: type=1326 audit(1761153105.752:2152): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8212 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1049.064154] audit: type=1326 audit(1761153105.752:2153): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8212 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:11:45 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) 17:11:45 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = pidfd_getfd(r0, r1, 0x0) renameat2(r2, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c, 0x2) 17:11:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:00 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b3d, 0x0) 17:12:00 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:12:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b40, &(0x7f0000000000)) 17:12:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000027c0)={'ip6gre0\x00', &(0x7f0000002740)={'syztnl0\x00', 0x0, 0x4, 0x5, 0x6, 0x5, 0x39, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x81, 0x7800, 0x7, 0x6}}) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmmsg$inet6(r2, &(0x7f00000035c0)=[{{&(0x7f0000002e80)={0xa, 0x4e23, 0x7, @mcast2}, 0x1c, &(0x7f0000003280)=[{&(0x7f0000002ec0)="ac7ed49128d338047452ba5610d96edf73d435230161fff1e887a6f6b72ff47c7aa1f0b582a02735b54f13e3febb2ac61d35bcbdeb1023974dafc66d66cf718920d08129456446c2bf1303eb98e798114fca025f64335ad85fc51ded454332953dfa05749755fb21077a0ed536fac5cb38297e6b8364065c8f241066f3de16e0fbba4fd39b58f3d314978fdc608b9a34a16c2f41c6473d1c58f23a76c694e9c81a37b95e399b1b0835f72ddd5039f2f93d8e977cd49f8e31ecbfc60138954ffb27d68dea1479ddc22d7b39b22066c44da79dad4ff01b5bd778ac", 0xda}, {&(0x7f0000002fc0)="ef35240b432fc5c685a9a806f72f08cc932e231166ba1d15766e27e724d9c93bf06a68797d539b114bd7a9f1180e65", 0x2f}, {&(0x7f0000003000)="a8381e9ae96e50618c0ec7eccea635cf9d43b47123a23c519e54ea2ee0bb9d15305b9e6818d605cc3dbb723c66018b0825ec88ae34ffedad0a850d7f0c0d2367fc3fdfed3e385db096cfea31b654255576fdee5a57c0ad9a9b7e46e9ecd2a00e7d3ae80f94c192b7d74cecc78395403f79d23240a566d6b5f67e89555ec6b4f8e99412a8a853e8", 0x87}, {&(0x7f00000030c0)="1ce99359ec0aa68e3d8df3bb3f3cee954aed4fc7b10c9c1581f9fb599b9cac97e43b6d4905ad7ee58df88391bfbdaa100f30a1ca23e732ff42ca874eda9743a05840ef2d86780f3f5e04b1a2d2390d651c50602c9f52809899163c3bcc894bdebb3afc62e82321cd6ff666211b342d4a13a0da7d3c8c47b2f697229595c9292de7b872b3da8b7157e7955f733e13c425d1a6595ffbff0526b176e321", 0x9c}, {&(0x7f0000004240)="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", 0x1000}, {&(0x7f0000003180)="4a52b1316fccd23cba7efbc7a85ad529cbfe50e850c00e085ef42ceeb93c4318670e3e0f763799181b808cda2b523b8a77989abb4f1a6ac320048fa149cc56476166e1cf212780037904e48406c4b54e6bebaef8ad6e840cca7ca7bb70dd292992288892352cef90b31f28431c610811e553b60572ebc1d312f5eb4508fe51e267c23e3c7984b65c1316efcc38f2713b9f33dcb57a98c43ac8cb2a1779ba1986bbcd90de5f3bad3fb64812462792a8211c2f4c5ef60ff3fbadf0dfbaf93fceaa5a5cf606", 0xc4}], 0x6, &(0x7f0000003300)=[@flowinfo={{0x14, 0x29, 0xb, 0x1}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x3c, 0x10, 0x2, 0x0, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1, @mcast2, @empty, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, @dev={0xfe, 0x80, '\x00', 0x17}]}}}, @rthdr_2292={{0xa8, 0x29, 0x39, {0x2e, 0x12, 0x2, 0x4a, 0x0, [@empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev={0xfe, 0x80, '\x00', 0x1d}, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, @local, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x3b, 0x10, 0x0, 0x5, 0x0, [@empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @loopback, @local, @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}, @dstopts={{0x18, 0x29, 0x37, {0x1}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7e6b}}], 0x220}}, {{&(0x7f0000003540)={0xa, 0x4e24, 0x9, @local, 0x9}, 0x1c, &(0x7f0000003580)}}], 0x2, 0x20040800) [ 1063.624981] kauditd_printk_skb: 49 callbacks suppressed [ 1063.624999] audit: type=1326 audit(1761153120.443:2203): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1063.640063] audit: type=1326 audit(1761153120.451:2204): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 sendmmsg$inet6(r0, &(0x7f0000004140)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x80000001, @remote, 0x4}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000080)="e707432460f2ddabbac04a03dd9d895e", 0x10}, {&(0x7f00000000c0)="ac24a9f146e39be1e43c6c91c2e5cad804a1d1a0f23745869c9f2b088d1b2f", 0x1f}, {&(0x7f0000000180)="02b05e258b50b6930bd5bbe5681ae8be2515a26133b230be3a3f51568f55d9cfac567737c16546abc143e855515e1eda30bd334f4a3d51a029888d902b24e242ac0d93e80c4c5b6915443dc64abecf14a6ff", 0x52}], 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x12e8}}, {{&(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback, 0x80000001}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000240)="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", 0xfb}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="2f5174f0938929bcc3890d298ca416eec79c49682b95cfd9474e55f312f554cf93e209cfecffa612b2e59e63ee5d7a61ee3955deae7f35637bd58bef0dbf71b9aadfb4b080136969bf18e0eb52986575af28f26f", 0x54}], 0x3, &(0x7f0000002800)=[@hopopts={{0x30, 0x29, 0x36, {0x89, 0x2, '\x00', [@hao={0xc9, 0x10, @local}]}}}, @dontfrag={{0x14}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x88, 0x4, '\x00', [@padn, @hao={0xc9, 0x10, @local}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1]}}}, @rthdr_2292={{0x18, 0x29, 0x39, {0x2f, 0x0, 0x1, 0x1}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0xb}, r1}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1e}}, @hopopts={{0xc8, 0x29, 0x36, {0x84, 0x15, '\x00', [@generic={0x80, 0x3, "b58d7e"}, @ra={0x5, 0x2, 0xfd41}, @ra={0x5, 0x2, 0x2}, @ra={0x5, 0x2, 0x1f}, @generic={0x1f, 0x9b, "70d6d770e6608a49c4d90045e465c680549d1fb20a608248adccdd65acc1a6d16727ab2a50f4a31ea7082a1912536f67cd33a8b9804035ea6bf8a8a350b93e18845fe47aa384789c50a4891553d94e83f38cd2ece148e4d6c198a9335c91e3e8db348eb7c779c57f7f8d83253f5565d15b277b959d883fe7142ab830fb75d756177a99ebc0cbd59a465282f83303a85d1a6cbcad202a74d507855c"}]}}}, @dstopts_2292={{0x130, 0x29, 0x4, {0x2c, 0x22, '\x00', [@hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x10, {0x3, 0x2, 0x3f, 0x2, [0x7285]}}, @pad1, @jumbo={0xc2, 0x4, 0x501}, @generic={0x7, 0x44, "11a99b15b8e3de79aa6ceb15dc2e2d696981beefbdbe0fb1941ce089e0ebcf556c01e59f977277b6c74f5c4f41b19650cda56a291dd620a5ad4a3172b46ffcb7144bd0de"}, @enc_lim={0x4, 0x1, 0x1f}, @generic={0x5, 0x95, "0372bd8b282014c28ee684d0409b3071ce77f6e8031d58af9bc47cca2fcf9acec6bc980c59411da3d02ed035838694a99348d6d3d40e2dae355fd9b2b2a1f7ef3c4b8fd63a187617bd1d0fed9c4552e6b27bbd3e5ea4c720d831652ce6149ccfc7bf947c5a431dbda263e9b5a83ebbe79000f62f4a6bd3353f5a5e336e4acb691d0c435f2b8fd55972d026187bae72a93f9d0e3ef2"}, @pad1, @enc_lim={0x4, 0x1, 0xff}]}}}], 0x2d8}}, {{&(0x7f0000002b00)={0xa, 0x4e21, 0xf76, @mcast2, 0x8}, 0x1c, &(0x7f0000002c80)=[{&(0x7f0000002b40)="6135729fb650e232cdf61198228ebcf345ffde6654d1f445e54bba821d099e09721c3785e416b393c8d4132dc3aef4d88b7980ca694d91ce83c580517ede95ad6103a1013188fffa0f52be1411d8432bffc3272eb0af8be870eefe6fe4b1ca0119588a9f269fe5fe4d2a4b54d481a87a3bb9f76f04958be148b18ed58a67c5d177cfbe2280402f1a6a2046b9349976720e601e9718687844d96a42e09b9bbfc58afb749a5dec244eda27e88e5247e5c7e05c7f3e3983039cfa684efc9b7907289b0c8c06617cd46cefe471d3cfe47085e3e3748647994f5caade30407473ac1a0b7a59750d915a84742bc6056c673e0a2732a18314a003defc", 0xf9}, {&(0x7f0000002c40)="8e7e53827a1181a642681d71303040d7c76e25f94be32da5a35eaefd9f89a431c29664c479a13b0ec19eeae5dc0b750fa7d5dc650d5971c2ff4e", 0x3a}], 0x2, &(0x7f0000002cc0)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x2b, 0x4, 0x1, 0x8, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback]}}}, @rthdr={{0x68, 0x29, 0x39, {0x0, 0xa, 0x2, 0x1, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @rthdrdstopts={{0x98, 0x29, 0x37, {0x89, 0xf, '\x00', [@enc_lim={0x4, 0x1, 0x6}, @jumbo={0xc2, 0x4, 0x8}, @calipso={0x7, 0x8, {0x0, 0x0, 0x6, 0x4}}, @jumbo={0xc2, 0x4, 0x4}, @calipso={0x7, 0x28, {0x0, 0x8, 0x8, 0x6000, [0x5, 0x2, 0x2, 0xffffffffffffff6a]}}, @generic={0xf9}, @calipso={0x7, 0x20, {0x3, 0x6, 0x81, 0x2, [0x0, 0x2, 0x4]}}, @hao={0xc9, 0x10, @local}, @enc_lim={0x4, 0x1, 0x40}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @tclass={{0x14, 0x29, 0x43, 0x8}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x89, 0x2, 0x0, 0xfe, 0x0, [@mcast2]}}}], 0x1a8}}, {{&(0x7f0000003e40)={0xa, 0x4e24, 0x3, @local, 0x1}, 0x1c, &(0x7f0000003f80)=[{&(0x7f0000003e80)="47b90dd61300bf06e97e27f2b95a17c59d921b1979f1717107304383034df5a9d74bb8a65e8e0df631b2b09bd51fce90223d8a6042ea393a40acd322edf658b7ec44d0668da5023155f7280d6c98dcad9bed1e44f38a2b2d00a3d5bd949af98bf9436dfaaae33eae2ab5bc810276ebc1b3fda07957d106b54920775082a5ce410ea7570413ab73a076e99541d6e7b612976f42d792ec0869361bb3e3308314e9b1cbb0c8af3fdec68290af67bf4a425d721c14dc278d540a5299144f25f62f64419dee7f3bf0", 0xc6}], 0x1, &(0x7f0000003fc0)=ANY=[@ANYBLOB="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"], 0x170}}], 0x4, 0x40000) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000140)='./file1\x00', 0x4) 17:12:00 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000840)={0x400, 0x7fff, 0x7fff, 0x3, 0x9}) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000200), 0xea4f42, 0x0) [ 1063.682860] audit: type=1326 audit(1761153120.451:2205): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 sendmsg$inet6(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)="21d067", 0x3}, {&(0x7f0000000300)="914cdb57fec21d92960823b09aba5edc57df0f203d0482af81f0f3737b843a122272de69df75ef7240898321049977f6969a9e30b9ae1ff7c9e6c27599abc425330d95b5ec864749e97ee994ccf58a03fa66649295d53a4d49ce", 0x5a}, {&(0x7f0000000380)="245b4eea8478d8519965ccd88c98a7d4600f173a08be287d70153e063a2b1ba999e623b55ff9cf76a36e826b740285febd0db9283a193fd3adc68d73790897d84b6d54714a2a58769b57b4ca267e5ded0ceaa79ae18a36b1e50cd33307d403e6800c3e23d26aeaa0a0a4db66c1e6087f1b0e9f1c5adea13ffa61d96607c78116b7cc53b917a0aa2d6b66eca4a157363b9c1a9298b7daaa9d43bf2d3602655f6d2b119620372cd39f336ca4fafb79f5f1f7a2109cf26a8189d4b3d9a170cd4ce5c7268c3f50d3815e3cefb866e8d6944089c361e7752554af3fe538abba120b610b46a15c6f2fd75d1cb0338c4b4a98c09dcc81d418a8bae939", 0xf9}, {&(0x7f0000000480)="cedf5a5120a1ff9eb20393dc5490b51e5af9c01fc358a8e2ee86d6a2cd050ec1cd578ef0a2494730180334ed5fdb89d71a813c0b0c1e46059544d00a619bf2e372a92ac2349f0499568b54577accb7190b71cfed62ca9ffd69c49854a61f46797e5fc359d6e5a04b5c19af15a3d7a5c3735de6aaf1b962e53770e58b8d279ea687475fe05eb2646d43a7002b576c38aaabfce3242a1c9a46d64543e3afee55dd92d2e5ab724648e0813a5bbb2fd1c5cf38fc5c6b9bea60f20a227e4197ab378b06ca9e9e22", 0xc5}, {&(0x7f0000000580)="a1e2af203b41c76e91750d1366b0ecddd13d5280ea09c398827a0d954012d30092d8b1b5424d52369fa50a63adea2983fa66fc5350736136ae1cb16e64f85ecdb070a67d06cbb5a2e87e7a14b0fdf9deaed240975f0411a611cd744559d57b1bc158664b9240459845ee5c286899dfe2cf49bde20d56a570998f1ae8d03251539a4a315751aa8571cc07761f4c38996afee9212a92c716863ed66af449b0b42476421532ba72f7d31126342369ed1fa90a85961f2ae2dee0ee8f068090156ec2de07e788f9109212a90d461ded17", 0xce}, {&(0x7f0000000680)="827aaef2e4dfb2b243d52f927e8de4702fbbdf3a64b97c5bf0bff29619e12a6bb8ec41c70205cda43ce3dd78d90e325cf4c21ee57312f8720f49b9adc12d82ad4321a98114a8cf36138bc5e0ba69047d7c6bbee7d6ae65efb8b6a9b0d3ab8bdb3c76f5757084559cff133674440a60b0cd0630c0f46d5dafa40ea9107494503831fa7b30e06d", 0x86}, {&(0x7f0000000740)="64423b3c3d49b22f317d87186afa7ca60efe08babcf1401508a530cbec00aa5150676f09f54e11a6a6d99340e3f0ba3150b7b55207", 0x35}, {&(0x7f0000000c00)="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", 0x1000}], 0x8}, 0x4000) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000001c0)={'wg2\x00'}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mknodat$loop(r4, &(0x7f0000000180)='./file0\x00', 0x100, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x40080, 0x112) renameat2(0xffffffffffffff9c, &(0x7f00000008c0)='./file0/file0\x00', r5, &(0x7f0000000880)='./file0/file0\x00', 0x4) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x80200, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x200, 0x20) 17:12:00 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1063.705632] audit: type=1326 audit(1761153120.455:2206): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1063.729033] audit: type=1326 audit(1761153120.455:2207): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:12:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b41, &(0x7f0000000000)) 17:12:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b40, 0x0) [ 1063.761226] audit: type=1326 audit(1761153120.455:2208): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:12:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x2000}) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x2004, @fd=r0, 0x49, 0xffffffffffffffff, 0x8, 0x11, 0x1}, 0x5) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x7a1e80, 0x8c) renameat2(r3, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file1\x00', 0x4) [ 1063.800288] audit: type=1326 audit(1761153120.455:2209): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1063.818868] audit: type=1326 audit(1761153120.471:2210): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:00 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1063.843041] audit: type=1326 audit(1761153120.471:2211): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1063.908628] audit: type=1326 audit(1761153120.471:2212): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8251 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:00 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:12:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b41, 0x0) 17:12:00 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b44, &(0x7f0000000000)) 17:12:13 executing program 6: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:12:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x6e2, 0x20) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) syz_io_uring_setup(0x1841, &(0x7f0000000340), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000080)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r4, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) openat(r6, &(0x7f0000000240)='./file1\x00', 0x280042, 0x100) sendmsg$inet6(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000080)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r5, &(0x7f0000000000)={0xb0002004}, r1}, 0x7fff) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) 17:12:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b44, 0x0) 17:12:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:13 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:13 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:12:13 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1076.842144] kauditd_printk_skb: 62 callbacks suppressed [ 1076.842162] audit: type=1326 audit(1761153133.660:2275): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8304 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1076.859431] audit: type=1326 audit(1761153133.660:2276): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8309 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1076.892705] audit: type=1326 audit(1761153133.660:2277): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8309 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1076.930165] audit: type=1326 audit(1761153133.661:2278): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8309 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:12:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b45, &(0x7f0000000000)) [ 1076.955586] audit: type=1326 audit(1761153133.667:2279): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8304 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:12:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b45, 0x0) [ 1076.991956] audit: type=1326 audit(1761153133.667:2280): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8304 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:12:13 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1077.025956] audit: type=1326 audit(1761153133.674:2281): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8304 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1077.064682] audit: type=1326 audit(1761153133.674:2282): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8304 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:12:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x4) [ 1077.099785] audit: type=1326 audit(1761153133.675:2283): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8304 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b46, &(0x7f0000000000)) [ 1077.141981] audit: type=1326 audit(1761153133.675:2284): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8304 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b46, 0x0) 17:12:14 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f0000000080)='./file0\x00', 0x200000, 0x100) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat(r2, &(0x7f0000000000)='./file1\x00', 0x18402, 0x84) renameat2(r2, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) 17:12:14 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(r0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:12:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b47, &(0x7f0000000000)) 17:12:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:28 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1091.220118] kauditd_printk_skb: 47 callbacks suppressed [ 1091.220139] audit: type=1326 audit(1761153148.038:2333): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8354 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:12:28 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:12:28 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r0, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:12:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b47, 0x0) 17:12:28 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f0000000000000400", 0x1c, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b48, &(0x7f0000000000)) 17:12:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x301080, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x1002024, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}, {@access_user}], [{@subj_user={'subj_user', 0x3d, '{'}}, {@obj_user}, {@smackfshat={'smackfshat', 0x3d, '}!'}}, {@obj_type={'obj_type', 0x3d, '.#['}}, {@hash}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) [ 1091.249308] audit: type=1326 audit(1761153148.038:2332): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1091.284375] audit: type=1326 audit(1761153148.043:2334): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1091.317568] audit: type=1326 audit(1761153148.045:2335): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:12:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b48, 0x0) 17:12:28 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x402200, 0x0) fstat(r2, &(0x7f0000000080)) [ 1091.366040] audit: type=1326 audit(1761153148.053:2336): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1091.406014] audit: type=1326 audit(1761153148.053:2337): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:12:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='net_prio.prioidx\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r2, &(0x7f0000000a80)={&(0x7f0000000140)={0xa, 0x4e22, 0x5, @local, 0x9}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000180)="7188256104153b0cee8d60faff1d561c9b4a300f2a53c140b1be0732349e3052488cfcd16b5bdc4af40fbfb501f52fb0fbc96b766458d839f50ea387b416d0c18fce17b25b0e01384bcbd4db69ac0c5853c1a3fca9b6adced59779a88a8da1ade75765179e39cd24", 0x68}, {&(0x7f0000000200)="4ee3917d1e15bd2939e3d7dacc77ad2aec36ce3b486f79d6875be2aa98e62e96c465111a53082b633f0ed90fe856b0d181221280904a085bcab9045e1688a872ada0384f6849758b00597a2ccfed28415e1eecbbc6aad05621a7de93b6fc807b80c6ef2818c2d8c1ca8ae27b972646d47aa52309", 0x74}, {&(0x7f0000000280)="67d1af7fc7e697edf1efe81e556bb4ea237a2bc4f7b581ff4ca3cce46936241027a539f79fa34b281a048868ecfbe11f7292", 0x32}, {&(0x7f00000002c0)="330e4fc02c3df36a3a515c008e4d0791c7eb904ec81f83db992193742d23573230b7a2dfa5ee291b0342758a98621d01306fdd7a6a214b631eefd04a46932e242a34c70d72d44ca6fc179453d66ebe215bd13230f1eae6bbaaa70adaaa30651f913b63b215f5aa3a090ac885e4ea1ea33f84781ff61701b4faea774e63e8caaa6ed744b6a86baafc9850f8f12da7cdc97b786f507507af3b788f4cd0fbf328ebf1dbbf1de3d0e16ec079ae1b33ef0a5ac337be9f43f8a767738dc7df3121a47d55e2fb753b514bbd7751d3002c74f74e18", 0xd1}, {&(0x7f00000003c0)="cdb43e96b679f42000a5dd311a077623269044be347fb702bbd55cbcffbcca6ecead419ddb706439a2568c5ea51a6247d9fcbfa9b4e2b902c9955fd61e82ae6be333ff9996331bcd5ebc060e7c1a1f6023c259b0b4d3c0761018617dbec360c9bef47637f6767d85abe605c0dff861c91ebd53b4d5a715324e5cce3a12b895c10d8f2a68424647a37d2a2ffed319d96565901b380336a3dc46050cb014a0fb18b30a245b36d2753fea3dc258984e27ffd40ce7c244c90229aa72e903f539ac1f1f5477034f59f3f49be4559c9e13f217da03a95c22d0f4646f34c14dd4174f0d00744d00837ea2e7fe", 0xe9}], 0x5, &(0x7f0000000540)=[@dstopts={{0x288, 0x29, 0x37, {0x0, 0x4d, '\x00', [@generic={0x80, 0x3d, "648478c0db4c6b9fc5a3b5130e0683e0a5c91d030bdf35cfe1bfd4bed90503f3b9c37a24c35fdfac08a90bb85b35012ba928fe298dbb680748acc686e0"}, @generic={0x7f, 0xd8, "6b8ca3838dab11f6fc64562811073ce003c89aed7dde84eda5690c0f494117c5659ff73aa2d51017febd0f0495a25dac5c069d23bea286a80c0712665187a94e95f41aa73fa62d02496278c1ff00fa65ba9e47d5f084bbf7e96368a285e86bb45997abd1ff9e383d67b680a107dd26289eab5c0da2083ef3c776c89220207006b2141348bdd9961438bd471ef46cfb741ae4adca625906b16dd144e302c0be54032daa9f94d454538938ca6403abaf560a4c0487d21dae095b4a9057c3d7c62fdb4e3bc83606be3a14a83a212c864803f0bd94e3bbdcd0ff"}, @generic={0xc2}, @enc_lim={0x4, 0x1, 0x5}, @calipso={0x7, 0x50, {0x1, 0x12, 0x1, 0xffff, [0x1, 0x4, 0xbc, 0x2, 0x8, 0xb1, 0x4, 0x7, 0x1]}}, @generic={0x7, 0xf4, "1c8c339f8d004c451da1b20ffe910fd4c82cdeb1d63f391dc13f3f794b002cc36e4eec6211305d304ef7e43c9f7c4b84f7ce5bf5ff9a9099d56ca592f793381209c48b64df992088190dbbea611bf700c87f3e967d151c9e1b3108f4a7c91deb293fe74f73d446aec74661a58b14a9ccce7f54ad1fd53dbb62872bf49258d9cb4736a9741df9c28aa709f1a5a18568f384517e6f2707e629808befc59475475782496564ab990af8dd78e53a200ab474c0c85a75a489985de3b230c710796e124a2cf496b5173d7e5392fe05744fc50d1e86e1d241a5501ec89ec349703d6236c4149d545625fac8f95ec70c74c261c49e16781d"}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @empty}}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffffb}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @dstopts_2292={{0x50, 0x29, 0x4, {0x1, 0x6, '\x00', [@calipso={0x7, 0x28, {0x3, 0x8, 0xff, 0x6, [0x100, 0x4, 0x3f, 0x1ff]}}, @ra={0x5, 0x2, 0x6}, @enc_lim, @pad1]}}}, @dstopts={{0x48, 0x29, 0x37, {0xc, 0x5, '\x00', [@calipso={0x7, 0x20, {0x3, 0x6, 0x40, 0xdc00, [0x1, 0x94, 0x5]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}}}, @hopopts_2292={{0x110, 0x29, 0x36, {0x33, 0x1e, '\x00', [@calipso={0x7, 0x38, {0x0, 0xc, 0x3f, 0x8, [0xf2b, 0xd718, 0x9, 0x7, 0x5, 0x72]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}, @generic={0xa8, 0x18, "a47c0bad148acdc2e740562e2eb554091b6a29f326d359c7"}, @generic={0x0, 0x97, "af9d235070e0f77a98acc71bd7741a85004903c294cdcaaed70afebf42fe65a3e909d4c20d79a77abdb30df28d131ec07ead42fe69c4918b1e4242cc34f5601f5fbeba8e7c6378d68da4ff1413f0bdf6739771dbf0a5bea4b4b1ee2a85b53b2413dc78a5c80a8a78d8f7fefffd2f0026389542cf554593b5d9552e52b89bcdc8ea1c613163ae220a4de2e2ee7eeb202d4733627cb83bab"}, @enc_lim={0x4, 0x1, 0x5}]}}}, @dstopts_2292={{0xa0, 0x29, 0x4, {0x59, 0x10, '\x00', [@hao={0xc9, 0x10, @empty}, @generic={0x3, 0x6f, "43e89c4b01be4d9b2c00596c67f2636aaad6dfb59eb2bcd572b2eec0c38e82d5c1217365fd0865de5a1b6013666dcbc1d3790010f1108ddb9cafd3060336a2a7e2a78d2e77ffa24cae1794c3741a99c758c2bb5d4e56f2b19468c13028121504553fd21bf62c80820e257edec2e9fc"}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1}}], 0x540}, 0x4000) sendfile(r2, r1, 0x0, 0x80464c453f) 17:12:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b49, &(0x7f0000000000)) [ 1091.439083] audit: type=1326 audit(1761153148.054:2338): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1091.487023] audit: type=1326 audit(1761153148.054:2339): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1091.517647] audit: type=1326 audit(1761153148.054:2340): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:28 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r0, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) [ 1091.556798] audit: type=1326 audit(1761153148.054:2341): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8356 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b49, 0x0) 17:12:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:12:45 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r0, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r4, &(0x7f00000004c0), 0x10000) 17:12:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4a, &(0x7f0000000000)) 17:12:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:45 executing program 6: setrlimit(0x8, &(0x7f0000000000)={0x4, 0x8}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) setresuid(0xee01, r0, r1) setresuid(0x0, 0xee01, 0xee01) r2 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) getrlimit(0x0, &(0x7f00000001c0)) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffe000/0x2000)=nil) getrlimit(0x3, &(0x7f0000000040)) [ 1108.427601] kauditd_printk_skb: 58 callbacks suppressed 17:12:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) mknod$loop(&(0x7f0000000000)='./file1\x00', 0x2000, 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\b\x00\x00\a\x00\b\x00\x00./file0\x00']) getdents(r3, &(0x7f00000000c0)=""/16, 0x10) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000080)='./file0\x00', 0x6) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x4000) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x195182, 0x51) write$binfmt_script(r5, &(0x7f00000001c0)={'#! ', './file1', [{0x20, '\xe2!@'}], 0xa, "cfc7665a10ac344d6f730db446858483c5bc7c178fd53dd884ded242a4fcf7598cfcad44f588b4266e31eed8ac5b12117b60"}, 0x41) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000300)=0x100000000) openat(r4, &(0x7f0000000100)='./file1\x00', 0x8600, 0x48) 17:12:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="02000000030000", 0x7, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1108.427619] audit: type=1326 audit(1761153165.245:2400): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1108.455977] audit: type=1326 audit(1761153165.246:2401): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:12:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4a, 0x0) [ 1108.482122] audit: type=1326 audit(1761153165.246:2402): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1108.488906] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. 17:12:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1108.514781] audit: type=1326 audit(1761153165.247:2403): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:12:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4b, &(0x7f0000000000)) [ 1108.530867] EXT4-fs warning (device sda): __ext4_ioctl:889: Setting inode version is not supported with metadata_csum enabled. [ 1108.543695] audit: type=1326 audit(1761153165.247:2404): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:12:45 executing program 6: setrlimit(0x8, &(0x7f0000000000)={0x4, 0x8}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) setresuid(0xee01, r0, r1) setresuid(0x0, 0xee01, 0xee01) r2 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_LOCK(r2, 0xb) getrlimit(0x0, &(0x7f00000001c0)) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffe000/0x2000)=nil) getrlimit(0x3, &(0x7f0000000040)) [ 1108.579822] audit: type=1326 audit(1761153165.247:2405): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:12:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1108.616744] audit: type=1326 audit(1761153165.248:2406): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:12:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4c, &(0x7f0000000000)) [ 1108.662981] audit: type=1326 audit(1761153165.249:2407): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1108.688948] audit: type=1326 audit(1761153165.249:2408): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1108.723192] audit: type=1326 audit(1761153165.251:2409): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8401 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:12:58 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:12:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:58 executing program 6: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) fcntl$addseals(r1, 0x409, 0x4) fchmod(r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file1\x00', 0x799181, 0x120) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a81900001000010400000000000000050000000005000077bc0800000c0040802b001000da469d86f2669dc235ccc7038ca6c78856fa22a3ac9d41c05761e11494f426038a075e5d168bd8e209a2eb2129c08982185397d8a643317d775c0d78d73198f136fc4cd5a0b5fcbf82a431130a2c35f3c76c696994ce8251b1b82db82c6121a0932028fbfa9df317450d6d8b725894881205a3124fb7dd410ed7b28e5a5153389a0a4247816e7bbc46f6aa9b558c3a80db5a17932460e5b804feb7a8ef7b972008806a5c16cb9bb65289d168c62877b294031426e83e060f2ccde7888d6d297ad9295420ccd1a2bc3a3921fa23fb", @ANYRES32=r2, @ANYBLOB="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"], 0x28}}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x4008, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8914, &(0x7f0000000140)={'lo\x00'}) 17:12:58 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1121.340125] kauditd_printk_skb: 48 callbacks suppressed [ 1121.340138] audit: type=1326 audit(1761153178.158:2458): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1121.348637] audit: type=1326 audit(1761153178.166:2459): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:12:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4d, &(0x7f0000000000)) 17:12:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) r2 = fsmount(0xffffffffffffffff, 0x1, 0x80) renameat2(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x7) [ 1121.362948] audit: type=1326 audit(1761153178.172:2460): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:12:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4b, 0x0) 17:12:58 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1121.383634] audit: type=1326 audit(1761153178.173:2461): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1121.399651] audit: type=1326 audit(1761153178.173:2462): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 [ 1121.418983] audit: type=1326 audit(1761153178.173:2463): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1121.432708] audit: type=1326 audit(1761153178.174:2464): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:12:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b4e, &(0x7f0000000000)) 17:12:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4c, 0x0) 17:12:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) [ 1121.462610] audit: type=1326 audit(1761153178.174:2465): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1121.505630] audit: type=1326 audit(1761153178.174:2466): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8434 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1121.508981] audit: type=1326 audit(1761153178.178:2467): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8433 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:12:58 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:58 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="0200000003000000", 0x8, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:12:58 executing program 6: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6f61636c2c003ab4c95e2c134afa230c8a813e2e"]) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000280)=0x1e) perf_event_open(&(0x7f0000000200)={0xe78587088d48fdc9, 0x80, 0x4, 0x20, 0x2, 0x2, 0x0, 0x0, 0x80000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x80, 0x6, 0x396, 0x3, 0x0, 0x1ce, 0x44a, 0x0, 0x471}, 0x0, 0xa, 0xffffffffffffffff, 0xb) 17:12:58 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b52, &(0x7f0000000000)) 17:12:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4d, 0x0) 17:13:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b4e, 0x0) 17:13:14 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:13:14 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1138.103167] kauditd_printk_skb: 40 callbacks suppressed [ 1138.103181] audit: type=1326 audit(1761153194.921:2508): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1138.110626] audit: type=1326 audit(1761153194.921:2509): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:13:14 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1138.128808] audit: type=1326 audit(1761153194.926:2511): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8485 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1138.132864] sg_write: data in/out 327644/1768 bytes for SCSI command 0x0-- guessing data in; [ 1138.132864] program syz-executor.6 not setting count and/or reply_len properly 17:13:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) unlinkat(r2, &(0x7f0000000000)='./file1\x00', 0x0) 17:13:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x6, &(0x7f0000000240)={0x0, 0x0, 0x4, @tid=r0}, &(0x7f00000002c0)) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) write$binfmt_elf64(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x5, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2b5, 0x40, 0x0, 0x0, 0xff}, [], "1e564753e51459f42377a4a4892f4e4c53db77962d0049a65842530b7b76d3b3c0325a6c989cb25066463867a2b230ef2e3722ed1dcddcf81ee8b3dd15149def3ef45f7fd4538a00300072177ccab771398fa89067c484d56653f2dcb2eef7dc8717ddc0b75500c64d40538f0e2c12342ebb38acd2d2c8c48cf5babebf44066a2bb82af1394b5018835588971d35cac0a6eef437919e673c5f7e8d4392c70d55d2fc6fb48429229eab8c17b6fff0bcbc063d4cda7155799e8b2cf4e6500f26cbdc8dae7f26b94c3a3238941458c1b5766b3b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x712) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000540)={0x53, 0xffffffffffffffff, 0x22, 0xf0, @scatter={0x1, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/22, 0x16}]}, &(0x7f0000000200)="9e04e31a437779a72a4947c8c972dd73deaafa272b9ba1314c62e5bc38c3852e0142", &(0x7f0000000300)=""/131, 0x10000, 0x30, 0x2, &(0x7f0000000280)}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) timer_gettime(0x0, &(0x7f0000000100)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r4, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_settime(r4, 0x0, &(0x7f00000004c0)={{}, {0x0, 0x3938700}}, &(0x7f0000000500)) 17:13:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b62, &(0x7f0000000000)) [ 1138.147149] audit: type=1326 audit(1761153194.926:2512): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8485 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1138.160038] sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1138.161582] sd 0:0:0:0: [sg0] tag#0 CDB: Service action in(16), sa=0x4 [ 1138.162657] sd 0:0:0:0: [sg0] tag#0 CDB[00]: 9e 04 e3 1a 43 77 79 a7 2a 49 47 c8 c9 72 dd 73 [ 1138.164016] sd 0:0:0:0: [sg0] tag#0 CDB[10]: de aa fa 27 2b 9b a1 31 4c 62 e5 bc 38 c3 85 2e [ 1138.165364] sd 0:0:0:0: [sg0] tag#0 CDB[20]: 01 42 [ 1138.175968] audit: type=1326 audit(1761153194.921:2510): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1138.192565] sg_write: data in/out 327644/1768 bytes for SCSI command 0x0-- guessing data in; [ 1138.192565] program syz-executor.6 not setting count and/or reply_len properly 17:13:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b63, &(0x7f0000000000)) 17:13:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b52, 0x0) [ 1138.215423] audit: type=1326 audit(1761153194.928:2513): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1138.240938] sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1138.243023] sd 0:0:0:0: [sg0] tag#0 CDB: Service action in(16), sa=0x4 [ 1138.244531] sd 0:0:0:0: [sg0] tag#0 CDB[00]: 9e 04 e3 1a 43 77 79 a7 2a 49 47 c8 c9 72 dd 73 [ 1138.246385] sd 0:0:0:0: [sg0] tag#0 CDB[10]: de aa fa 27 2b 9b a1 31 4c 62 e5 bc 38 c3 85 2e [ 1138.248252] sd 0:0:0:0: [sg0] tag#0 CDB[20]: 01 42 [ 1138.249966] audit: type=1326 audit(1761153194.929:2514): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:13:15 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1138.282883] audit: type=1326 audit(1761153194.929:2515): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:13:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) renameat2(r2, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x0) [ 1138.324645] audit: type=1326 audit(1761153194.933:2516): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:13:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b62, 0x0) [ 1138.355144] audit: type=1326 audit(1761153194.933:2517): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8480 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:13:15 executing program 6: prctl$PR_SET_IO_FLUSHER(0x39, 0x1) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, '+{'}, {0x20, '#'}]}, 0x10) dup(r0) 17:13:15 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b64, &(0x7f0000000000)) 17:13:15 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1138.438074] SELinux: Context #! ./file0 +{ # is not valid (left unmapped). 17:13:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b63, 0x0) 17:13:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x438202, 0x120) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x60000, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) 17:13:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b65, &(0x7f0000000000)) 17:13:28 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:28 executing program 6: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd21}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_trie\x00') syz_open_procfs(0x0, 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) fsync(r0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f00000013c0)={0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000080)='net/fib_trie\x00', &(0x7f00000000c0)='./file0\x00', r0) 17:13:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b64, 0x0) 17:13:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:28 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:13:28 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:13:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x6c) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) lseek(r1, 0xdae, 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000000c0)='./file0/file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x2) renameat2(r3, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file1\x00', 0x4) r4 = socket$nl_audit(0x10, 0x3, 0x9) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r5, 0x8001, 0x4, 0x4, 0xc85}) r6 = fsmount(r0, 0x0, 0x8e) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r6, 0x6628) renameat2(r3, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000080)='./file0/file0\x00', 0x0) [ 1151.892133] kauditd_printk_skb: 44 callbacks suppressed [ 1151.892153] audit: type=1326 audit(1761153208.710:2562): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1151.922850] audit: type=1326 audit(1761153208.710:2563): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:13:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1151.947482] audit: type=1326 audit(1761153208.711:2564): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1151.962499] audit: type=1326 audit(1761153208.712:2565): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1151.975059] audit: type=1326 audit(1761153208.712:2566): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:13:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b65, 0x0) 17:13:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b66, &(0x7f0000000000)) [ 1151.984849] audit: type=1326 audit(1761153208.712:2567): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1151.992126] audit: type=1326 audit(1761153208.712:2568): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1152.000987] audit: type=1326 audit(1761153208.713:2569): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1152.012260] audit: type=1326 audit(1761153208.713:2570): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1152.020748] audit: type=1326 audit(1761153208.713:2571): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8536 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:13:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x101) r0 = socket$nl_audit(0x10, 0x3, 0x9) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), &(0x7f0000000080)='./file0/file0\x00', 0xe, 0x3) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) 17:13:28 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:28 executing program 6: unshare(0x6000480) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x134) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@ocfs2_parent={0x18, 0x2, {{0x3648}}}, 0x0) [ 1152.302189] debugfs: Directory 'loop0' with parent 'block' already present! 17:13:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:13:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:45 executing program 6: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:13:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b67, &(0x7f0000000000)) 17:13:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b66, 0x0) 17:13:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) 17:13:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:45 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1168.502159] kauditd_printk_skb: 44 callbacks suppressed [ 1168.502181] audit: type=1326 audit(1761153225.320:2616): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1168.539753] audit: type=1326 audit(1761153225.321:2617): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:13:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0100000000000000000000000011faa7f42f329ba38568ee000000da43ac5b7288ab523fd2971edf764c7573018f95cfe21d294724ddc5e946ee39666bdfaf98d96e7ccc33fb66342f20ab2417819b0a6ab22e091ae80752a297f124ca3c76d082d6537e2b141193b861421f2a0046efb6f3be0000008000200000ee0ac83364897d4ba33f510f5e1a9c7d05fa76ab5c803194d256fd490008ae987e010c218834cb339dd40b500a24e6fb909ea72c408e4359fe4346a74a5909eda4a4712860f0bf9e3a3f4aca4682e3076591e3e8c36e085d9f03f82836"]) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r5, &(0x7f0000000080)='./file0\x00', 0x4) sendfile(r5, r4, &(0x7f0000000180)=0x1, 0x9) [ 1168.556686] audit: type=1326 audit(1761153225.325:2618): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1168.577977] audit: type=1326 audit(1761153225.327:2619): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:13:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1168.625312] audit: type=1326 audit(1761153225.330:2620): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:13:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b68, &(0x7f0000000000)) 17:13:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b67, 0x0) [ 1168.657677] audit: type=1326 audit(1761153225.330:2621): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1168.684158] audit: type=1326 audit(1761153225.330:2622): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:13:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:45 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) truncate(&(0x7f0000000000)='./file1\x00', 0x5) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x40002, 0x4) [ 1168.729946] audit: type=1326 audit(1761153225.333:2623): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1168.758752] audit: type=1326 audit(1761153225.334:2624): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1168.804318] audit: type=1326 audit(1761153225.337:2625): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8583 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 17:13:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:59 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b69, &(0x7f0000000000)) 17:13:59 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:13:59 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:13:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000000)='./file1\x00', 0x4) r3 = getuid() stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x7, 0x8, &(0x7f0000002840)=[{&(0x7f0000001480)="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", 0x1000, 0x4}, {&(0x7f0000002480)="16a99991dcdf62ef6e91c20b5b4ec5adfd3f0f601d197017e52d55cf0849dc16d8488a3bab8dca2a81e63be558dfb571a4f0dc88a2c535dd4131f8681813bf5d7ce6b918ab9f8a9f55895829961c67738069776e1c16a7aaf07a78ddee69a3734ed3193717058e309309d68af0e0cb40075d437a48f88d6491a0f30683cd1578d50860cc2b044bceb3d98d96acab10d1a3893fdf", 0x94}, {&(0x7f0000000300)="81f85a84d071", 0x6, 0x7fff}, {&(0x7f0000002540)="07f36e33e2fd51dc1a1639c496c0637c4d234e40e933e0d5ae03263b4d7c0630bea2e03f60b4d8eb5249ba9dfb925727b87635b6875f235b631ab153fe5daf39b34173630b5e02a8797619988e32e130048c1bd58dfb57f5fd5614862ec644ba6e6a1dfb0d9cd1332aef6d8da1e5534a915c93bcd952a64e98aca71b769bde6591613e9435e519dc06bb247e20d9312f3f37b05ee13071925eb01792fb59902989e1d15782f8fc5c1be349f8a887ee12360f809896b12095cc6a7737f4c7015d0bca91d7f52636900116fc37503ae4ab654aaeaef4e543990e63925a90fde435d573b3c788d4e1396e4c3f2cfa205233b419", 0xf2, 0x2}, {&(0x7f0000002640)="0be421e537a38e3633418a8f11da03300f774e084586707005184ce1aa4b0c5f6ad9afe0cf3ccd678ca87f5ce6abced80c9a770ec7795065aab5fb921cf375451e6a21b078b72cdef2ce4849b16180246b84d812e87a6eef1a76545669296164c67c8e44c7c9d65952eab3ffc6d143dca0898e83a10733dbdfc91fa3e7535286c3ed91c04c0e63d3b7b2d17b93f6fe9756d8060cea93346eec2c52e2dc703e0f83d157fe47159380514afb33d292805e85954878f4cba0555e68ffec98a196eef8c3ace81619b11d925d454694f12ff5ea83e74ed9f5562c13146eeecd6fc1cbada3c661d2202091bd2a641f98d52021", 0xf0, 0x2c2}, {&(0x7f0000002740)="2504bb9a5219ebcacb4fa9aa5c4a35867af90cea2f0c228cccd6b11b6c259de4fedde5f43b4715057f9b4f5dfb60e6e48ce8088e86a7626714726f30d3eb5abef731ee0c9b0411e545c2a006e71156c5cc36a5335551b8abbd7e06bdadd64d5318bb6bebf9c771d1ac1edb81625e4e5952a7", 0x72, 0x7fffffff}, {&(0x7f00000027c0)="17faa793d3e6df9c7f4603dcd60b8ad2c6d5bc1e2ad47cd2a59b4060e8231774c6d9086d3a319fee5a1949aad663bb234675e25037b1e584e9b5281b608ae07719209c", 0x43, 0x15}, {&(0x7f0000000340)="c30ebdae390a725a769cbdcc", 0xc}], 0x405, &(0x7f0000002900)={[{@nojoliet}, {@cruft}, {@uid={'uid', 0x3d, r3}}], [{@hash}, {@uid_eq={'uid', 0x3d, r4}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_user}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@audit}]}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r5, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$inet6(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000002980)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) r7 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="7768eb74d4b3cac4232344e96bc2903af609e6a1bf28d48b904a75c590cd3b0c9e64d89098040cbcd3a3f71cfa1fd2205e974f97f3881c161c66eb25e3d833635d5fab7058bea9bd85be3243c495c2accd5d3e7cb93e4c9063b44f57d2d550cb9e1abd0c7a1eb4382aceb1d3e616799654498d0f42ba175f77617f45784cfccb1ee9be0b1b013619ed7cf600f1ea169588074e96d026e346cc582b9937992a3bac20fcd5958ad13d3aca145aa3dc116269fe1d934083718d862c49a1f3d134d545600cce49a695d7e5b7ea824b5722b105bc04af427ff7bdad986b6921f6807ddbd7c6", 0xe3, 0x598}, {&(0x7f0000000200)="62e90baab2de84e26a88f6914d80ece38b0df7dca38ce95776d628da", 0x1c, 0x1}], 0x1708a, &(0x7f00000013c0)={[{}, {}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '=\x00'}}, {@fsname={'fsname', 0x3d, '+%@,*-+,%'}}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, '*}'}}, {@obj_type={'obj_type', 0x3d, '\xbb'}}, {@fowner_eq}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) [ 1182.404081] kauditd_printk_skb: 56 callbacks suppressed [ 1182.404096] audit: type=1326 audit(1761153239.222:2682): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1182.428888] audit: type=1326 audit(1761153239.247:2683): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1182.434064] audit: type=1326 audit(1761153239.252:2684): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1182.436647] audit: type=1326 audit(1761153239.252:2685): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 ioctl$BTRFS_IOC_SNAP_CREATE(r2, 0x50009401, &(0x7f00000003c0)={{r7}, "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"}) 17:13:59 executing program 6: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000), 0xff4d) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @rand_addr=' \x01\x00'}, 0x1c) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r2, 0x800, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x1ff, 0x40}}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x22004851}, 0x4000) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000000)=0x8, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_SPLICE, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index=0x2}, 0x10010) 17:13:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b68, 0x0) [ 1182.452776] audit: type=1326 audit(1761153239.261:2686): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1182.463758] audit: type=1326 audit(1761153239.261:2687): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:13:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b69, 0x0) [ 1182.477027] audit: type=1326 audit(1761153239.261:2688): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1182.490865] audit: type=1326 audit(1761153239.261:2689): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:13:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1182.508547] audit: type=1326 audit(1761153239.261:2690): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1182.522802] audit: type=1326 audit(1761153239.261:2691): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8623 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:13:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b6a, &(0x7f0000000000)) 17:13:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) 17:13:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROMEJECT_SW(r1, 0x530f, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x7) shutdown(r0, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x1) connect$unix(r1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_icmp(0x2, 0x2, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000fec000/0x13000)=nil, &(0x7f0000fed000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f00000002c0)="7f78396d2197d4bb09a0d1e2dc531075bf78210c851c52e46172f25f66fcd3f0aa18918da5cca0a2319d9bb6225d8fad956498ff856df7236b5dbd96e91698222e524b829a4f99d2ae098fc554e70cc980c7f6d79ca7fdacf1e783c88dd75375cdad44e92e144b62f992520592bf36ffe4266d2b6f41e284677c84af0a1895fcd9c8e80d8b3a1e408c08e9eb5f8cc261dd673433861a6be320211352e3791cf6778f0f73ba658775f0e0739485a6294fc223927d1c39b3713eeaae1cd5107758fce3767dccd751e7b26366cc5b22fb156b3be533c9063d4f9119d4f87ae2b88626f194", 0xe3, r2}, 0x68) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xb, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x41, 0x80000001, 0x0) 17:13:59 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b6a, 0x0) 17:13:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b70, &(0x7f0000000000)) 17:13:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:13:59 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1/file0\x00', 0x2, 0x130) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2400, 0x104) 17:14:13 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:14:13 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b70, 0x0) 17:14:13 executing program 6: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x4, 0x13020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x3, @perf_config_ext={0x0, 0x2}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x3, 0x2}, 0x4) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/net\x00') ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="e400000000000000000066696c6530003b44f8ab889543a9cfa4a4a9af2a610595fb74c14b9a6cab80fe254e65867e748f645b3027d4fcbe2251b483d730de258b6332b008488a37401f28a63ec24be955fd99803084a977e417d47ea1976593a93dbeeed18e9147932bdb2b49f5683b0e275d3ee3e3d45f0f6a02eafd6c"]) 17:14:13 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:14:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b71, &(0x7f0000000000)) 17:14:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x20480, 0xa) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x1, 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2000000) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000100)={0x800, 0x9, 0x0, 0x40000, 0x8}) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file1\x00', 0x4) 17:14:13 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4b72, &(0x7f0000000000)) [ 1196.870688] kauditd_printk_skb: 73 callbacks suppressed [ 1196.870701] audit: type=1326 audit(1761153253.688:2765): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8673 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1196.892912] audit: type=1326 audit(1761153253.696:2766): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1196.906064] audit: type=1326 audit(1761153253.696:2767): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1196.920037] audit: type=1326 audit(1761153253.697:2768): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:14:13 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b71, 0x0) [ 1197.007649] audit: type=1326 audit(1761153253.698:2769): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:14:13 executing program 6: sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0xbc, 0x0, 0x10, 0x70bd29, 0x0, {}, [@HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000}, 0x8044891) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000004) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000200)=ANY=[@ANYBLOB="feff00822db87c3d55efd9599e442eb7afdb49b36aca6ba79b96f004bd6d0886a18278e6d9821c9fc6c31f0c", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f662c86a260b1ec035cfee65237e05634de93ac3f8819dedb65c8fa8891ef2e1462c2cfba9e02ef30e546553ce5"]) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000100)=[r0, 0xffffffffffffffff], 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x91) r2 = creat(&(0x7f0000000000)='./file2\x00', 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="200100000000000000000000000000027f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c7ba67cb7d38793daf5bb8e"], 0x134}}, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000600)={0x84, r3, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffff}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x20000000000000}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x84}, 0x1, 0x0, 0x0, 0x400d1}, 0xee989f8f83854c42) close(r2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c005ba5ecc6e7fb6e7d0dd60c5c814dfd19140700e62f"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000000c0)={0x6200, 0x1f, 0x1}) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) ftruncate(0xffffffffffffffff, 0xd5) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r4, 0x0, r1, 0x0, 0x200f5ef, 0x0) 17:14:13 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1197.043863] audit: type=1326 audit(1761153253.703:2770): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8673 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1197.088835] audit: type=1326 audit(1761153253.707:2771): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1197.124844] audit: type=1326 audit(1761153253.708:2772): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:14:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x46e2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x4) [ 1197.164898] audit: type=1326 audit(1761153253.708:2773): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1197.180793] audit: type=1326 audit(1761153253.709:2774): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8682 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:14:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4bfa, &(0x7f0000000000)) 17:14:29 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:14:29 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:14:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file1\x00', 0x2) fcntl$dupfd(r1, 0x0, r0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file1\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r3, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000140)='./file1\x00', 0x4) creat(&(0x7f0000000000)='./file0\x00', 0x1) 17:14:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:29 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r2 = creat(&(0x7f0000000000)='./file2\x00', 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="3401000017000100fbcffd88633564d9ba6af0ef00ed000000000000fe8800000000000000000000000000010000000000000300000000000000000000000000000000007f000001000000000000000000000000fc000000000000000000000000000000000000009a1b9ea36b07ec25", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200100000000000000000000000000027f00000100000000000000000000000000000000000000000a0000006700", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="00000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000c0008000800080000000000"], 0x134}}, 0x0) close(r2) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x200000a, 0x13, 0xffffffffffffffff, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x5000)=nil, 0x5000, 0x4, 0xabe023afc5a1eeb9, r2, 0x10000000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000080)={0x1}) io_uring_enter(0xffffffffffffffff, 0x10004e10, 0xae64, 0x0, &(0x7f0000000400)={[0x6]}, 0x8) syz_io_uring_submit(r4, r5, &(0x7f00000000c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x7}, 0x80000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) write$binfmt_script(r0, &(0x7f0000000440)={'#! ', './file0', [{0x20, ')'}, {}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "0a38b247981c6cdb63e1ab76e1dfcf7536759b8863487e8b45ce070256e71b41566f44b5c351dbdec2a9972e8bd161b7eedd9e8852886ff3bd37ae238631a942144184f91a4b6e89a82123e2f36901bce11093cd1085bb366e3d4ab9fa4ebd7d37b7fd5082ebd3893be3d31449544cf793522cf30056c0beb0"}, 0x8b) copy_file_range(r6, 0x0, r1, 0x0, 0x200f5ef, 0x0) sendfile(r0, r3, &(0x7f0000000140)=0x1, 0x6) 17:14:29 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b72, 0x0) [ 1212.992799] kauditd_printk_skb: 45 callbacks suppressed [ 1212.992812] audit: type=1326 audit(1761153269.810:2820): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1212.996743] audit: type=1326 audit(1761153269.812:2821): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1213.010621] audit: type=1326 audit(1761153269.813:2822): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1213.022529] audit: type=1326 audit(1761153269.814:2823): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1213.037616] audit: type=1326 audit(1761153269.814:2824): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1213.054621] audit: type=1326 audit(1761153269.822:2825): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1213.062059] audit: type=1326 audit(1761153269.823:2826): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:14:29 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4bfa, 0x0) [ 1213.079657] audit: type=1326 audit(1761153269.823:2827): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8726 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:14:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4bfb, &(0x7f0000000000)) 17:14:29 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1213.103838] audit: type=1326 audit(1761153269.824:2828): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8720 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1213.111999] audit: type=1326 audit(1761153269.824:2829): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8720 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:14:29 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = epoll_create(0x7) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000040)={0x1068, 0x3c, 0x2, 0x70bd2a, 0x25dfdbff, {0x3}, [@nested={0x4e, 0x1, 0x0, 0x1, [@generic="b3e6f4bd4034ceded6f9fa1d7f7c567ff2d4d350632919e421f1f990fa8df347f4bdd3be5d08f51e1303265b837571a766d836a3e846c0a7c8b1", @typed={0x6, 0x30, 0x0, 0x0, @str='-\x00'}, @typed={0x8, 0x90, 0x0, 0x0, @fd=r0}]}, @typed={0x1004, 0x7f, 0x0, 0x0, @binary="86dd80b0aa083fcc13f7763d5c7ecf61e0f5ead84b5904666f78643ddee3bd64830890e8af84cb25ecf1b373a9bdbdb9a1e5850c9aa2cadceb0e21be262ef5c1c6247e0345aa7f6d8bf75448b34e0f7a81a63321bfe67376f087c6ff894a79c244bea28b2336fb9d09c25687821dbbfc7ec9f13a7d2f06b9d5a6c202f8a7342d65e13ac370ade5a73c2a50526c33a6e86c8d3267bbac2f90e1417c2f7c7c6957e1ec5e4e3aaf4f58b7f31b51e84c4b1d107a3f0d6e4551450719f20caddf2cc9e8e67344396739d1d644f972cceb54ccd187cf1cb9875dcb9a7077d241c4619b54a5a7fc9d65b2ab64d8d328d3dd49183cb05bb6302c15e40194dff995e7b4762e8efe3d3dad25b455461e8ce305e390d28acf60aedf77c85e3bc7cf9ec33f0fa9454f36f8b1657fa71ee29361dca0e1c4659a9d9d2cfed65e9f384b901599219b4d5b66eb6a18015187978507a5b93b90cd27d5eb60ecd5ddd0ac179a8e2dd22418d5bff3219e61548e101987f93e36faf3e229bdcd790fde8ebb71d3f0a6631ea1ace5a47fece8c96973d287b3dea36ab09b34112d2a1d5e3a7bd33e3fbce2cc40a17bbb07a4c2e30e347c853d3b19404fcdef4deedc91435d576379347fa0fc491ef93ebf0e4f756efe56a32e92c4b469870336e6c532d805d8c76260bea7661598e01c6ebb427d414e771db9a19c4e3b99653cd13391825ed2f0a75034c90a1183ab195a46f906f28e6ff423dafc6bec61bc9a45a343c8586c7a1059778af6aac07249f5a01e910f8c3d66c176e9a4ed432ab39cc1e9de00a0cb621c40f1ad61061a7ae03cbf74c32eab2da2eab092a356102bae0eec47312609e6bc033f18117ed1dd2a2dffcc540d08966af00ec70ef02118f8870edab9cceefc455ec13f8bdc91ae88f266009101652f91aa4749a4ae47886e5bd7f7eb279a017d75a4c7e9b4e0df909bb614b3832e214dba3e88ff6161622e7e944aaa0dbec6ffff80d8e2dbf025488be6549ae5d9803531fe6aee839c294478e4f53771f6fdd85bf8a6ef2cf7b11c8d025c285744fa08482b34987c548d4cff9d83f970caf487118388ac89d3148b29eb849db0bb3df26d4543491ef2f16b9f4d13f8ff3b4f20edc2e2de319b24d3177a88c1cb396564264812c6c77afaa6c03a8f09e2ce02c85dca8e4ce9e08f654725c1b12874a9ac347da10818374690c53d5453bdc492e218183e90e194be5062643366bd0a0fc94cd5c9e8722cb155f38b3b9423abccd57999531745e9d27e772f2cbd4c2dca9c272227d92879beac5f510639dd927ac8b24594a50a99b1a070ac5f8e702e3fbab80672eebe9f41cb657886c1ca1dbc4f20de565ebe5583018fd3235ac395b80435fa73ba0c98be9f586a740f0bb9ca269950a016d3281b152d424d680af9aadb7bc6a842233e25dc39ec3cd7fc9684b7eb156bd613375b310fe2abb876f6072fa151d2559cd7c2f11d6d49db002aefbc92698e62435db100ba14bc114ea269e2e5a22b6ae26781e906ef7f60882d99240c8c5eaba6e4e8b6e83d7bdd810087a464ab0528b226b2c2f7c98394a2cfc4de753f8e24b431918d8acb30e2c3b1e86dde8405a04d7bd961942abd9fe0cd64865442808a5bbb225174859ac8d28a6d42be1e869741f8859467562fcd88af4a0b8dd4842ef3a25afa6cd31434e40a34657844e9ebb53547bf8db7de859857ea42f9d117f0bf9bca6ecb32cc94ca6187ad5de7ed477fd74d0a0f6a8cf049bfdb16c674854f4bba21b10559fc76753a4a756de2f44e5d5c9677ec242d75030b77208042af5c2202cec0924da0c0061de33ff57414cd387666dac65a8db9773cf507af7934ae46c1204dd771072fb5805f21bbfc5712fe6ca22ae4af4b2e084c7bc5da8c91586293830feb6318d7a58336e2504125daff3431e7536c36eca775879827ed588ffcc7b1dcad7b66334fdfc23223b888ad17a59c30da9dc32f1d12d2d530c063363b724ff0db1cec88d946328acf660848045562e28b038e7d96d453cb0d4d6a7078d05eccb929085842325b7f892edd9c663a321f38c027d1f977ec4d7eb7d5ca7f7486aa24c11d9b8fa7213618c3b9891d71f1bdf907c7f04096370146b1ff32305256c5393c27d91e135c0238ee4eadc90a6780020b92d908ef03fcbb0288ffe70efd07244bb39ea342c53026f2316dfc64ce3438190e6adec26d031e4cd2d322bb77f6adeab5514e2f412b0123344046046179b74c8113e880a7f8725b122b3a1a81cf6d32185627b228f68c83ceb596876fbcfc283b146d2a3b21f7bc1739125a6640cafe24ace3afa529eafa42f467beb8cf49f657665e3f9c549bb11acc0ac9a5574596af12d287f4b8775b2a459ebd5b56e05b7d74b5736b3e172d11af2dec0b4b2007e00f7d1d78b77613751d962a9355963dbdab280710d0be175392cef7c7bdea68a3eb83e1e5cad28358234658d51ad5e161fe68f42e7679994d15453fc2654294cf997baed8f51fcd48412bb5e6be1c6909af89681fead7bc1d424f2305d454174077e33d557b41a4ed3e352fce8bbe02d14bf68e85bf013ee3f109c6d39a6705aed8cc656fcaeb0b9452ab6fc687603adafe112a46089f867380fa68b566d2b4c2f64d32f515db66a97088d1926ef49aa71b619fd3a9393be0f1b76547020a9ce94132516a31950c8950af79352c9a58b79be9d9b654a21ea889b6880b904151260ce7bd605751f3c31939adf38a0691c5b75f4d4dcf4408b48dd821cd47b9f93323f8ec55bb7f3c0810e35ed45eb757f4888404b6a0a4cfa371e4480741d1fc710c8bea39338947c56a386b28a25bae97c1fd56b6158b35ba94959549b136c1693a459b7efddc82e1516aa7224e69d112656ece79e5438a3dc0128982a0e824c14be2e4e7a818b558837c82433d957be93aefcf8bd333166e6cb2bbdaf24cdc9d61f318c49d82bbc80062fb83cda12ef6ee6f0367b67ceb3dc5a5023500c38714f8126d2d7ff7ee333d8a62e8b872658dcbe6512fb1176366917f85d8b6baa7394b5d27cff99c6aa9dc56869a801c1907c7049f55887e68e0ac0c266fe3174fa906cb2b04b878d65eef8e1701c3dcc3640e8c8eb6d3b3641efd34ba7d60bd1ee7ec6a8743d95212bd4b1448deca70f50da04d340d4d7797751a6b499e9f5ddb04d737292da09ae7c30a2f9d1750382863cf4c283fd4e5a313d034ddc26d390ac16a48f20e2e70b67a5851f0eb2a0db3361fadb0d9952bed310f3e76f242554ae08f83e686f0f9b8a7d4eba5df18dea5d0ea53f3b5a5c06c48277b44402da638666c1bd49a5d568b3ab4c587d5afd3addb0655218e3e36d0d00d402461c66270c7729c47f98683c42c687a8bc05169cd379d613157053c153083618f363ccfb3dd70083bcc705505a19bc14d1197b98cf330d9e2e7d1387f5bb3a229210186caf1d42d746a419312ba8b1cd2add01ef14dba311134a43eec565957437ed4779fbab24182a3913a5dd4a6cfc62971fb6539498b3d317d14320475b05b4ae867593640f2b865a35901e72493a07639f71477edb0ed7ed0bf43717a933b2d58a25e344b8dad8090c7a8bd4c7d2768c8fffec220b795c15236254353791f38a52340d62e0b036c59d233fe156d13d5aa994ad265943a872bbf9c298b1cf2e7b01550b25cd48c263eec86d78092a3e79bdb3ef964c3d2e92692101fcf4a0f390c703de821a1d41f6bc018213bb46273ca9774d63641162d3c10c1853ff2fd2ca8762b191a8249da70ba9598ac06a4cdcbb8b8edcd40930fff87c47153569b405d7357ede6499e806a8c0080beae26f7c2307cb860d7942ae62dd1d75f8e51d2715732ea5f285e912b927229e1bc3ffcf13a056aa1037033bbf5a0ee532ca77de31935b097705b37cde7be0f5afc4adc66016e203be04840e30b39adf44b03848d89a11b4219b5a5f7a71d32ff9195ff0a1c066cc1d9438033f4e6a6f107fa8825e7e6eb2da8fb6e1465f470579b58e9a89a30e124631950e3f0474e695f0cb232859d22098ec2db211383a6592933431fd87920fe8413600ce200570b5e541120a59ca84257d1005adc0c6871c0363947bfa65c95d17b6a4a59f12760b1a7a5c9147704591cc80626f4b89571e5d2160a4e46156c0d37ee9bdc02bc13f146d173041f2509a1dbf0658bc17937db2c4a140b4f5d4307d7dcb73a5d0dc0e20fec5933f8ef55a8d01aaeab5a3a52eb4ea23b3e8fd04b917f63cd40c2f68a71f27ccba4187673dcd0e089c0963bb0a13d3e36700c66897a572c704c4371b1831d4c6230f3424daf4a89d4f6c6c5cac6f9d3a27fd75c4c534d59e4e3fe778a43106a76a9d6b9ad437dd5ba90c98d76b7316c848a212f776bd9788347696a21b3e5415101d171d4ddc8bca9e5d86ce10ad546aa47fc8bd3f70d939a6584fd3a94568ce57d0dc4adac04a328b49f4dd433c61c101f68bd60d7192437801f5fe291f8dc5c8796d567983ed43c7d5707957386513f13e7dd9894a4f3c6c31e44b263cc822c5b01a3e9f83375db22b4834eb7d9e1adb1fd83e8db8b018376aa90c4461538ba51f370ff1726429cd05b99c22356d984ce092e306bd60d2b7031992d5018f7186757a952956cf01e62d96ffd2e3ebe348492e5b707ecd0684d32ea924be19ab28e5df3af27fac2b970cd011fd77be07cdfe9541ae1d931b6a6cd26531c986a2bd4693784aae479eb570ce033ca3f01a57c1377bc1e7739ca5a7e1cb91d351585ba3bb8a0d2a2a6604156c4666c904c43bf210c511c1dacc8e393ccb8e58f63cf4c623fa5889d053bb898838fcf9360a8eceace9ef12c37980f5b9155cfbbec03f60a95655c462d892bf077fa3a7ba1778d69bb3880e821c484cbc166a126b9d7dd35f16c5a6fc6074969786de6a7eb5ba57b0027fd594057dc79bfe1a2c8f9874a5a40dbb9dbe5de8fdf1c51fa7f5cf861ad88427a81719c8ef8bc4a69c91feefcd2634bf872fd02e306a27eff6622465f7cc3b6898307cd211eed614300b2c353aa9b8792f8515b29c769c5be96f5a602eba0fa8604b2fc177e8ee42ec4d41474cf3ffdebfb88dd11e02011a2bed4a9bba5b5c9040eb2b9ae4d975126460ba5bdf286548cfe00f961962fbdf65c6b859220c533f8ff12f3a3b2084884b9f37d36026fbb9ca6f2a38ea85d92b1b831e2a7a8ae92f3e182e8392f22c69f390a097fa598121cc6e7c8619cd149863c4077252681003fd5ca75f395122be07ccca248fe3d98013d92079df0adcc3ce7d100d36809e979ee092b8b47a30dc4728c69696a28ac2ca081f4f7294ef2a7bfd819ef07ba18f4dd1265feefc1ad49d6dbe48f361521804ebeeef3958d30d1bb0832d6d96af8efec38c02127b8054b82927d480266bbeafe5f2a81a46da43a25ae63c0d7927612947bc806ba8bb0dbf750479972ebb821c9a08258b040b13a0848a21ea3ffaad4f827f80eaa0e70299ad73c0065f74a35f42c14931d4ac690e57b9037a3a98e405c664e2c4b297a9f910ff9e285cfed2ebab883c0a5d2dfc36535d2668b1d5095cd5d9871b4fc792b1ce4064cde2c59776ccdd9f51963ec06a0de861df661b689559041477d55ef7e9bc1fab2ddc754a3e6350ccbb7fc7ebb2dbf8bc4554f5ab6ae05759a69a8925b9fb71e62120e91867e29c1c30ed673a1241b7954380819d964399050887e1dae93c3cf23856d165e22673e5675eafc28ea4e684d4a6f950aa21342bab5fc2f568a92e568c745c567b5f3822a99949eac37de38f9482a63152a563ba340"}]}, 0x1068}, 0x1, 0x0, 0x0, 0x4000010}, 0x20048801) 17:14:45 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:14:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file2\x00', 0x8001, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000200)="4c4dd13e08f18ea10ba6dc399dd447dd81dfd12d7c9b89a65bf5ca660bf5c85143e7aa236424c9a3139d9860702267cccf4053f45c857c7c8cd327670b0e95c2b35b356496fb4630d973f76734ebd85cd96abeef7d78a8dc4bf690dcc9549699a145ba0c0cc1b2688964aa0f7a3fd3d569915d1d81ed637473e4b85df067eaa4716b3499596aef6f31e236dbb8da349098e2b3cba0d5", 0x96, 0x2}], 0x2054ca9, &(0x7f00000003c0)={[{@fat=@errors_remount}, {@numtail}, {@utf8}, {@shortname_winnt}, {@fat=@nfs}, {@nonumtail}, {@shortname_winnt}, {@numtail}], [{@context={'context', 0x3d, 'root'}}, {@subj_role={'subj_role', 0x3d, ']'}}, {@pcr={'pcr', 0x3d, 0x6}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4) renameat(r2, &(0x7f00000000c0)='./file1\x00', r1, &(0x7f0000000100)='./file1\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f00000004c0)=ANY=[@ANYBLOB="f2d00d98efa284948120392941e09fddb7cfc88256f1dc71ded6ad4c64c5182309528b8d9a8e7515ce55dd95f7fa444d64d8f31ff6510f6b2c3796c2b7d86cf8bc93bb17a600fab77995bbed0c94d58d95249dc98394a8193b79182fb4b2bb85a414f1e566f0b24484eddea7a1c7fec7ea2c27d02f2c856a921876c1e49438bd6590fbe37d9cddc92cb7685d44184479cd548470b5a31e1cffdcea84560803a25016af76cee37b044794a2", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file1\x00']) move_mount(r0, &(0x7f0000000300)='./file0\x00', r3, &(0x7f0000000480)='./file0\x00', 0x4) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00', 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4400) openat(r5, &(0x7f0000000080)='./file1\x00', 0x90000, 0x20) 17:14:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:45 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:14:45 executing program 6: io_uring_setup(0x201168, &(0x7f00000009c0)={0x0, 0x4332, 0x4}) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xddca, 0x8}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x7f, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) r3 = syz_io_uring_setup(0x368c, &(0x7f0000000180)={0x0, 0xfaed, 0x0, 0x2000000}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) pipe2(&(0x7f0000000540), 0x0) getpgid(0x0) r4 = epoll_create(0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') syz_io_uring_setup(0x1841, &(0x7f0000000340), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000080)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x100010, r3, 0x10000000) syz_io_uring_submit(r6, r8, &(0x7f0000000080)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd_index=0x5, 0x10, 0x0, 0x1, 0x5, 0x1}, 0x5) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x5888}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r9, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) connect(0xffffffffffffffff, &(0x7f0000000240)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x80) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:14:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4bfb, 0x0) 17:14:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5409, &(0x7f0000000000)) 17:14:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1228.765461] kauditd_printk_skb: 45 callbacks suppressed [ 1228.765479] audit: type=1326 audit(1761153285.583:2875): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8763 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1228.776988] audit: type=1326 audit(1761153285.590:2876): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8763 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1228.805844] audit: type=1326 audit(1761153285.590:2877): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8763 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:14:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5409, 0x0) 17:14:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540b, &(0x7f0000000000)) [ 1228.864612] audit: type=1326 audit(1761153285.592:2878): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8763 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:14:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540b, 0x0) [ 1228.900906] audit: type=1326 audit(1761153285.593:2879): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8758 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1228.935667] audit: type=1326 audit(1761153285.594:2880): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8758 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:14:45 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="200000000000000004a56b23385b04351c5b15acdfe629a4dbe500138d81554485ab09879e9959fc592a950a433f5897fa18cb46c262b688a8528b382ad2df31d0f950b53f7f2667654569311f48aa546ba64e9e506e7707b40d91a597a1ef23ae705623c9958c1c162074800032cc4121cf43aa209c91dbb5c62202fcceada0be3ca43ede7ccac99dcb172d1c5d2efba25dd6789126091125a50ea1803bc3487e390049557c6236e2"]) lremovexattr(&(0x7f0000001900)='./file0\x00', &(0x7f0000000180)=@known='trusted.syz\x00') 17:14:45 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1228.967225] audit: type=1326 audit(1761153285.594:2881): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8758 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:14:45 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:14:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540c, 0x0) [ 1229.007272] audit: type=1326 audit(1761153285.605:2882): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8758 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1229.047835] audit: type=1326 audit(1761153285.606:2883): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8763 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1229.083259] cgroup: Unknown subsys name ' ' [ 1229.084396] audit: type=1326 audit(1761153285.607:2884): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8763 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:14:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540d, 0x0) [ 1229.102099] cgroup: Unknown subsys name ' ' 17:14:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540c, &(0x7f0000000000)) 17:14:45 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:14:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000480)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d', 0x5) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_trie\x00') readv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x1c, 0x0, 0x400, 0x170bd22, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0xa26, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) write(0xffffffffffffffff, &(0x7f00000003c0)="0289819eecd945439d8a8b16bf2bf2b67eefb591f4cf4db9ead300c6ac8ba94f7d4a804292338b2abd8472d8beffa0ce3669f0087fe6e41dd4cf60d158da85532ae8", 0x42) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x5, 0x34, 0x7, 0x0, 0x1, 0x10000, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x33f3}, 0x18140, 0xe81, 0x3, 0x4, 0x0, 0x4, 0x4, 0x0, 0xe9a6, 0x0, 0x4}, 0x0, 0x1, r1, 0x3) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 17:15:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540e, 0x0) 17:15:00 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1243.946566] kauditd_printk_skb: 48 callbacks suppressed [ 1243.946577] audit: type=1326 audit(1761153300.764:2933): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8808 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1243.949760] audit: type=1326 audit(1761153300.764:2934): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8808 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1243.962858] audit: type=1326 audit(1761153300.775:2935): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8811 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1243.965511] audit: type=1326 audit(1761153300.775:2936): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8811 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:15:00 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:15:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540d, &(0x7f0000000000)) 17:15:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000480)='\x04\xe8\xebC\xd7_\xbf\x7f\xd8\xbd\x89\xd4\xed\xf9e\xe7\x19M\x10\xb4\xaf\xdb\x1a\xcf\x1a\xba<\x93\"\xfe\xf3\xc6\xf4\x1b\x97\x1c\xf9\xf2R\x9bf\xdcJ\x87\x8d\x96\x86\xe1\xf2\xda\xa4^Jd=\x12\x9e\x82\xe62\x8a\x13\xb3GO\x97\x96V\x98\xcb\xab5\xbe\x13\xe7\xca\xe3\xe4\x17}\x19.\'I)\xf8\x17\xa5\xcf\xa7R\xf5H\"\xa6\xca\fa\x90Id\x88\xc8\x95\xf9?H\x0e\xf1\xa1\xb1)@J\x162.\xed\xda\xefZ\xfej\xa2\xbb2\x85\xe4j\x8dq{\x1cv\xa64\xce\x7f\xdb\x91@\xc4\xdb\x99\x9e[,\xeb\xe2H!\xc0V\x82bBX\xe2\xbe2\xa8\x90P7\xf2\xf59@q\xb2S\x8d', 0x5) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/fib_trie\x00') readv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180), r3) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x1c, 0x0, 0x400, 0x170bd22, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0xa26, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) write(0xffffffffffffffff, &(0x7f00000003c0)="0289819eecd945439d8a8b16bf2bf2b67eefb591f4cf4db9ead300c6ac8ba94f7d4a804292338b2abd8472d8beffa0ce3669f0087fe6e41dd4cf60d158da85532ae8", 0x42) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x4, 0x0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x5, 0x34, 0x7, 0x0, 0x1, 0x10000, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0x33f3}, 0x18140, 0xe81, 0x3, 0x4, 0x0, 0x4, 0x4, 0x0, 0xe9a6, 0x0, 0x4}, 0x0, 0x1, r1, 0x3) socket$inet_udp(0x2, 0x2, 0x0) sendfile(r1, r2, 0x0, 0x100000001) 17:15:00 executing program 6: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2, 0x35}}, './file1\x00'}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}}, &(0x7f0000000080)) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000540)='./file0/file0\x00', 0x3ff, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00') 17:15:00 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1243.983839] audit: type=1326 audit(1761153300.779:2937): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8808 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:15:00 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540e, &(0x7f0000000000)) [ 1244.000669] audit: type=1326 audit(1761153300.783:2938): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8811 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:15:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540f, 0x0) 17:15:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1244.016019] audit: type=1326 audit(1761153300.784:2939): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8811 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1244.050449] audit: type=1326 audit(1761153300.784:2940): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8811 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1244.056447] audit: type=1326 audit(1761153300.785:2941): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8808 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1244.066263] audit: type=1326 audit(1761153300.785:2942): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8808 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:15:00 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1244.207858] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 17:15:00 executing program 6: syz_io_uring_setup(0x0, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x10000000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='attr/sockcreate\x00') perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xfc, 0x4, 0x9, 0x8, 0x0, 0x40, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffffffc1, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x0, 0xc8, 0x6, 0x1, 0x100000000, 0xffffffe1, 0x8, 0x0, 0x4, 0x0, 0x1000}, 0x0, 0x4, r1, 0x8) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000018c0)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f0000001a80)) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="080500988400014637b5e6a174b7b2b317b4044a94da343dd489e684a04f4ca90665864272f2fedc47a9342fef8ad1fc88337e6391545bf80b8ea61a907e1120dcdd2930f3eace765860d93659a6dc77d049d1d90bf956808d12c853d595ab7ea7e76402b517c198dc7ffbdbb38ab65f84f5242824efb291f523ece2d8e79434f9fe77da5ead57c5f16fed9a43b14e466358a6b4c3a1a8361e8199db7e4116e6031e72ada1c25a85ea221f56", @ANYRES16, @ANYBLOB="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"], 0x508}, 0x1, 0x0, 0x0, 0x40000}, 0x48804) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) 17:15:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5410, 0x0) [ 1244.261218] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1244.262941] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1244.266485] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1244.320937] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1244.348715] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1244.350315] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1244.351978] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:15:14 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x540f, &(0x7f0000000000)) 17:15:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:14 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5411, 0x0) 17:15:14 executing program 6: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x180, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000380)) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5453, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/1) socket$inet6_udplite(0xa, 0x2, 0x88) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) ioctl$VT_WAITACTIVE(r3, 0x5607) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000000) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="ff0200000000000000000600000008000300", @ANYRES32, @ANYBLOB="0800000002"], 0x24}}, 0x0) 17:15:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x2e8, 0x1b, 0x400, 0x70bd2d, 0x25dfdbfd, {0x9}, [@typed={0x8, 0x34, 0x0, 0x0, @u32=0x10000}, @generic="d0d0b66a469955ce938e4a3c2d80015e4bbe05406ffcfd0cb2722559ce82027aeffb535a064554e651d1c58de4e4f2770438fb8ddc4120da04339474e0685d1401", @nested={0x236, 0x21, 0x0, 0x1, [@typed={0x4, 0x6e}, @generic="35369abd420ca81349fb304398bb04a2b138817d57d814d06b45b937bb5fbd329b45fe00ca4622e1", @generic="3fd5c46a1e1f70f598924907722584d7d1ccb6ec9af48159f21af57967d9be", @typed={0xd0, 0x73, 0x0, 0x0, @binary="753ad67bb96aa4fb194f158b11ec9ef7803a071462011fbef60532404029047793c7ada2248a40cbf9ab7be4d877aa301a0201a3bc3351964c55d394476e0f410890628d8c8905059156e9d89c041f87c227f4c8cea4b4d04b37b8635adb3ce89cfd2c26cb25c7e4438abc54e866a4b5f02589195068b3011076c7458ab68781a1ebfcf5680357a8f58e2370010898786912c0a88342a948ddb410724312da249c48190dccb66e8ba4f93ebcd188c2df092adc9d08506f56b6124e3e47c06350ad284f0c43af7d98055a1e13"}, @generic="c25db1e8ff31114cb7815963603956ca6fcd6ead043d076c3c4c123e19909e", @typed={0xf6, 0x83, 0x0, 0x0, @binary="9f7f0f720f5ec03beb23ab804aa96ff1b42b678e8c9788ec82ff8ac2dc97b26ade8488e810ae927ee78b97f4f5464cec00066732c8abc33f99be78ca21898496705b61ca1e00a5d2c91958ff5a04a186f2690ad7e752fff1058cb3d0c32a1ae2231c3c286c80af80414782e7a7cfb1cf567d5921f2516874bb120a2ab78f7ed5690ccdb15ecdc36490e22863c3d6808154d0eb1de3a878cbdbfc6c0d5aeafaef4ae59c49ba003971a96c04494de11e889499054cd6e30addc238ce9888680328f8d6bd02b654b314e3918ee3e26edc5f45b8c8d27a3f1b1d47c8207827d9aabbc295af859451b937bcb7abb36ea3f3958042"}]}, @typed={0x4, 0x52}, @generic="a066cef058ba41017af9558816faa2198cf8bcf02f34549dc42755cbf82a13d3bd0dda4a26e3263a20922cea56fc5b0339ae7d074bbd390278c6ab8d85bba0dda940c9595ada79803b1398371bd08c"]}, 0x2e8}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB="2b0286a28e0000000000000000000000006e53"], 0x18) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) 17:15:14 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1257.590395] kauditd_printk_skb: 47 callbacks suppressed [ 1257.590407] audit: type=1326 audit(1761153314.408:2990): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8847 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1257.595646] audit: type=1326 audit(1761153314.408:2991): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8849 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1257.599110] audit: type=1326 audit(1761153314.408:2992): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8849 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1257.602325] audit: type=1326 audit(1761153314.413:2993): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8847 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1257.605615] audit: type=1326 audit(1761153314.414:2994): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8849 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1257.617280] audit: type=1326 audit(1761153314.414:2995): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8849 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1257.637197] audit: type=1326 audit(1761153314.414:2996): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8849 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1257.657334] audit: type=1326 audit(1761153314.427:2997): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8847 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1257.683907] audit: type=1326 audit(1761153314.427:2998): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8847 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1257.689167] audit: type=1326 audit(1761153314.427:2999): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8847 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5412, 0x0) 17:15:14 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5410, &(0x7f0000000000)) 17:15:14 executing program 6: sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1b) syncfs(r0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x2082, 0x61) lseek(r3, 0x4b, 0x2) r4 = syz_open_dev$hidraw(&(0x7f0000000280), 0x80000001, 0x2cc101) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)={0x40, 0x2, 0x9, 0x0, 0x0, [{}, {{r1}, 0xffffffff}, {{}, 0x80000000}, {{}, 0x5}, {{}, 0x100}, {{r0}, 0x4}, {{r4}, 0x1}, {{}, 0x9}, {{r2}}]}) fallocate(r2, 0x8, 0x0, 0x8000) write$9p(r2, &(0x7f00000000c0)="0fb865562069ab2f32beb83e263962827b00d7d8b791e504b65c5ed26e6688d67a9796c1aedca0de65d21b4796fd1b3df0ccedf9739e29f6b965de85433255da7945b7a842ba5fa3dbe88cd26fc9b1b807bc2d59e5a9f2c2bdaccdb839190141ba0151232669cb02b3b076251c024d73f501a54d959dac7cdb3fc324ab47f2a3e1ef12691eac5cab96860e948e", 0x8d) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x4, 0x60800) fallocate(r5, 0x28, 0x6, 0x400) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="c40100006c65300074b4b472974a899b036ee6116b3d24df68600c58b184b0b544517773cb68d5b4fc3589b9f83cae529f39b46157148dbf49df3a53671823d587923d46bca45985100035f8c70569dce6820e9cd306004600da69197057cee00d0864b9770000000000000000000000000000e1dd4b39f460c2a53c29a5b59ed7"]) ioctl$HIDIOCGPHYS(r7, 0x80404812, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r6) 17:15:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5412, &(0x7f0000000000)) 17:15:14 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:14 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5413, &(0x7f0000000000)) 17:15:14 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:15:14 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5413, 0x0) 17:15:14 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5414, &(0x7f0000000000)) 17:15:14 executing program 1: r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x7}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="1a171840f5a4935c0c727348b6f3197ff661ade1", @ANYRES32=r0, @ANYBLOB="05000000000000002e2f66696c653000"]) getpgrp(0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000fffffdfd020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d4571082000000000000000000000000000000000000000000824a700900"/260]) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000980)={{r1}, r3, 0x18, @unused=[0xfff, 0x7f, 0x1ff, 0x1], @name="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"}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="3c00000001000000030015c1e10000030000000220000001dee8fc131fc92b57000000014d0ffee000008068fb93f20624d998bb2382fbef2e605d20efd13ad8020454fe726d5ec494d8000000000000b7382cb035ae"]}) sendmsg$nl_generic(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="d400000014000268e872002a36e58c2516000000309195bcedd4a355ffd0b57d36c80aa3cd5c00a209ab410588e2acf39f612a058aca019d424c1cfefa9bd84118e7b9a3dc7b648488e3b314280151f16e53c3b34d356001432e0e37dbfac2e264d49dde22ffb05d71782e4588a22964e120c9b3e8ac10a180903c642a26553943488705f8f9389f0dc82f10989f62b3874701ee49da692b47f3a2374ddcf5407ac1d8d6ece93e8156a83bca75748906b35121f4bfbcd532464798ecfcbf0151eccc1703000000e09aefabad56510f51901f721fb776488673f91400"/230], 0xd4}, 0x1, 0x0, 0x0, 0x8010}, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x82000, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000880)=ANY=[@ANYBLOB="010601060000000000000000000000000000000000000001ff020000000000000000000000000001fc000000000000000000000000000000f88226a91f8b26296906a7c6112d7c23cc1890b9dac6ad76f124cc078544b156c06a4b5f643402a388b7b6ede5be94169040c873919189f0bb22567c3a24bc8125a2e76bd2b3104ebbdb6802785a82b050ac7fb3228ceb0b614ec31cae8c820bae862312b19eb847822245ff0be847d669f25a0ffc03bce9499a5dbcd92b9d93e2314ecfcf71562229babcb88fdce82b9783e2c30ebcbb0b8b28701efe37da5c"], 0x38) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x8, 0x5, 0xc0, 0x81, 0x0, 0x0, 0x20010, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000200), 0x7}, 0x4400, 0x6, 0xec, 0x9, 0x2, 0x40, 0xffff, 0x0, 0x1, 0x0, 0x4}, 0x0, 0x6, r5, 0xa) signalfd4(r4, &(0x7f0000000180)={[0x9]}, 0x8, 0x80000) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x5, 0x81, 0x0, 0x1ff}]}) unshare(0x48020200) 17:15:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5414, 0x0) 17:15:28 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:15:28 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x18000, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c776654dd646e6f3d", @ANYRESHEX, @ANYBLOB="2c63616368653d6d6d60702c6c17af0d5d7ecaaf", @ANYRESHEX=r0, @ANYBLOB=',cache=none,appraise_type=imasig,seclabel,func=BPRM_CHECK,mask=^MAY_APPEND,fscontext=staff_u,obj_user=security.ima\x00,\x00']) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x3e, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_settime(r1, 0x1, &(0x7f0000000080)={{0x77359400}}, 0x0) timer_gettime(r1, &(0x7f00000002c0)) timer_delete(r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x405d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) fork() 17:15:28 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{0x0, 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5415, &(0x7f0000000000)) 17:15:28 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:15:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5415, 0x0) 17:15:28 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KIOCSOUND(r0, 0x4b2f, 0x8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={@private2, 0x2a}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) pread64(r1, &(0x7f0000001440)=""/200, 0xc8, 0x43) [ 1271.649105] kauditd_printk_skb: 89 callbacks suppressed [ 1271.649127] audit: type=1326 audit(1761153328.467:3089): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1271.660619] audit: type=1326 audit(1761153328.474:3090): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1271.686171] audit: type=1326 audit(1761153328.477:3091): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1271.717752] audit: type=1326 audit(1761153328.478:3092): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:15:28 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5416, 0x0) 17:15:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5416, &(0x7f0000000000)) [ 1271.756282] audit: type=1326 audit(1761153328.481:3093): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:15:28 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:28 executing program 1: r0 = accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000300)=0x1c) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x3, 0x4, 0xc388, 0x0, 0x5, 0x40020}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) timer_delete(0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0xba2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x7, &(0x7f0000000180)={0x0, 0x0, 0x1, @tid=r2}, &(0x7f0000000340)) timer_delete(0x0) timer_gettime(0x0, &(0x7f0000000240)) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) syz_open_dev$vcsn(&(0x7f00000002c0), 0x1, 0x2101) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="01ef07000000000000060000b6ffab423c9d87dcf81f4ea42dd825bdac1111ff42ebc34826007ce1ccd0049bd02a7b1414a5f9231630c91e629961d82e7c82443c08b29d7ffec459097484c60000000000ef9dbe38e116368c3a87f2856ca463d302bd95421a05d69149bc615e3b760ca0673bd894e9805bcd8440fe960d80436b894d05bdc59ccf9c865d526ccf9f247ce17c454b2d0644c13d9f79efa9ea01b40f87891ee96b16bfccdd23c9a8c978aade55e6421cdb88df1aba98e8f4ca115d64b574393166984a8bc1ee9b62196f7a707c2063956f11cc0d489b3218ffec284280bf667f9554164ff5ab922baf120d03dc839e9e4016f33d96c0ea536f1f68d58046bcc58dfebc66ea76342ed19a5ce4de1264b9eff0fc8fdbf26b9df6b691433ff838a8f62aaadb20f6bce52d285a67f5483b187f72d0d71534d5bf0daaa591d138a9af", @ANYRES32=r1, @ANYRES32, @ANYBLOB="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"]) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1271.803572] audit: type=1326 audit(1761153328.481:3094): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1271.825890] audit: type=1326 audit(1761153328.482:3095): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:15:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1271.864117] audit: type=1326 audit(1761153328.483:3096): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8916 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1271.901984] audit: type=1326 audit(1761153328.485:3097): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1271.931331] audit: type=1326 audit(1761153328.485:3098): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8915 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:15:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5418, 0x0) 17:15:44 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:15:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5418, &(0x7f0000000000)) 17:15:44 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:15:44 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xd3}, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000002c0)=0x2b) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000040)=""/102, 0x66}, {&(0x7f00000000c0)=""/82, 0x52}, {&(0x7f0000000140)=""/250, 0xfa}, {&(0x7f0000000240)=""/33, 0x21}], 0x4) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000380)) pkey_alloc(0x0, 0x0) r0 = pkey_alloc(0x0, 0x5) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, r0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x88ab470809e5749e) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)) fallocate(r1, 0x0, 0x0, 0x8800000) 17:15:44 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:44 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)={0x1c, r1, 0x201, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000000c0)={0x48, r4, 0x201, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x13}, @val={0x8, 0x3, r5}, @val={0xc}}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'wg0\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x48}}, 0x4) [ 1287.356714] kauditd_printk_skb: 43 callbacks suppressed [ 1287.356732] audit: type=1326 audit(1761153344.174:3142): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1287.366644] audit: type=1326 audit(1761153344.183:3143): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1287.389773] audit: type=1326 audit(1761153344.184:3144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1287.419967] audit: type=1326 audit(1761153344.185:3145): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1287.442054] audit: type=1326 audit(1761153344.186:3146): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 17:15:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541b, &(0x7f0000000000)) 17:15:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541b, 0x0) [ 1287.475622] audit: type=1326 audit(1761153344.189:3147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:15:44 executing program 6: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x180000) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x0, 0x0) 17:15:44 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1287.506380] audit: type=1326 audit(1761153344.189:3148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:15:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040), 0x0, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1287.534157] audit: type=1326 audit(1761153344.189:3149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1287.572853] audit: type=1326 audit(1761153344.189:3150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8948 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1287.604949] audit: type=1326 audit(1761153344.192:3151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8950 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:15:44 executing program 1: mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8000, &(0x7f00000000c0)=0x3, 0x1, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) fcntl$dupfd(r0, 0x0, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000100)=0x6, 0x4) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r4, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[], 0x80}, 0x1, 0x0, 0x0, 0x22000000}, 0x0) syz_open_dev$vcsa(&(0x7f0000000080), 0x100000000, 0x40000) 17:15:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541c, 0x0) 17:15:59 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541c, &(0x7f0000000000)) 17:15:59 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:15:59 executing program 1: prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='projid_map\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='projid_map\x00') ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x27, 0x9, 0xd, 0xa, 0x5, 0x20e, 0x0, 0xda, 0x1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x593043, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) accept4$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) write$binfmt_elf64(r2, &(0x7f0000000c80)=ANY=[@ANYBLOB="7f454c460000000407000000000000000200564e0002000000000000000000004000000000000000000000000000000001000000fdff3800000000000000000035d36b44d6e2bce5e517f624074e6b00002062ec0148ec46f0c925454265882b039b25d40447ee146b8afdedf50c2e324ace947fc23496bf3e23f7df789a0824913291458e19c9ebc4c389b8e4be3a3ea2da6d1346a2bcc7552d641832ded9a31745d0342d508722281a1a4fc8929e95bd862e2ef33fe120d50fb845439207488ef64691a8c4cc067705b0c1da5b12f543914310e927f47dd521c05430e646d48fd4b87e2e4fc11cac5d6b0ff86f79547284bdaeaa825950f64699d6bc0b9d6ec5ea08a50152ea21ebae4d6f13ac92e6dadeaee47299729a520900000000000000c3d8a98155c66ee3cc03ecb97545e469d8c1f52a6bb87e81117ec57d5dbde5dabe829cb42206e709a3716626d96d83ec97c38877fd527e3633f50e5899424ea26e628a48ec41fe8214a4a671dbe0f40eb045190b3292b1e219c5d5f0efa7fdba6941df5dc612eab769576638d85bf9d1105e338a49d79841b7e00279e3efe9f4f9f70ddbacbaee5a0d95d490117e1a084dae279a8af0c364abdfa2b848cf32cac891848c0496cea226582d3cd2ce68e36f627df6a889118b12eb56d59a43cf4d72f1d47a8a7d7cfbdda3251c94b67e9e61b269d50062d1da9956e398bd362cabacfa0a8b7ee53e4cbfec202e0fc5221f49180c654b0708fb916ae8a1d10fddd983dc8cb4b8756bcd2be915d869794e0daa007c1bfb9ccf9022696a6303ef96824467865eab41b8c5e59ac60ea56e81c613aa8c1e0583eef71b5f5321063be7e4069c258ad58c756d6fcf5663eae1dfcbb95856a9928ccc6d17a6540a74c8d4be87e294befbe555fb3f3a221dbe72f0f518ac9ebbb7f7fb2eb929efc0d4b80e3a3b5d9507af56142e12ddc3a57d0818f542bb56cdd5be58e36e13397786f329aa412c8db096c960e7b572f7279692f29b5420b8354b647e9f588e129df0703465a5cfae1da2c24d300bf4ad3ebdd198ee2945086bbee800098c95c4b89346e5f1ef8d117f1e2bb18bb5c46591f6eaee0e9947322352566530333f00e32129180ac361c652c42a98bd5ad3c1512e6a61e39557b22c4dd065d2d6dd24588f2cdbfd0cbc5483d56bf1e36967de7507d1c8da271fbd58854e1ca7d0cd8a9b195b6f5deaf33630b8991b5ff6fdd2da41512c7342fac3f5804c30ab8643feb95785edeae8a6148ebfffbf8d88f1ecf9b858795a29459b4853baa0c1e3c40e68139e4a32940312f04f86575b3c049aa50589c662665679c989f639805c9cb29b07f2ed901490a1ab09b47d8fa9f03aee2af13d11c2320e772671c48449d605326ab8d583b9a39a8bb95d0f4eeee97fb7d81db85f02e175415d6b899ef29f9b4d32b84eed4a522168a250cfde6a8fce8d1b5fa1d1720286e5692b73817c690bfccfe2049c062c59c61e4715c4cff82e2294dfab44dd94eb5d7804f11740cad19e17042a6e1bd2c66bb0d73c2f95e2153972bf882d2ff75032c79e299f65338ba6de03ad8f034233322df181b23d2eab6469b53b122f5fc25c24509380db526d3fb010cb85766f7362179278301c0b61ee92211d3ea644d8c379852be30aa39eeed055d07bf50cb5c98811c2b65279a00c612b296520116f689e2ce9ed1a2b7502acdfc12e972466fec636575b05a2d4a984381052ef1d4ccec2c6069e5b16ebb4654a6ddad0c3740e0a0dcd1ef5cf4dc936bb9dc4feb87e4aced46a3045a9b71e3b4bf1f2c6312b1d24a562a0ad206d946d56e95c791b41553ba7f345eccb8e897fa422e4"], 0x42a) 17:15:59 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:15:59 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:15:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541d, 0x0) 17:15:59 executing program 6: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3000008, 0x20010, 0xffffffffffffffff, 0x10000000) ftruncate(0xffffffffffffffff, 0x1000003) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r0 = syz_io_uring_setup(0x620e, &(0x7f0000000180), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r2, 0x0, 0x20) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)='./file0\x00', 0x50, 0x420200, 0x23456, {0x0, r3}}, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2200, 0xc9a, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000018c0)=ANY=[@ANYBLOB="140300e9ebec98a90400f5000000000004000200"], 0x14}}, 0x0) [ 1302.579796] kauditd_printk_skb: 43 callbacks suppressed [ 1302.579815] audit: type=1326 audit(1761153359.397:3195): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8999 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1302.591960] audit: type=1326 audit(1761153359.408:3196): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9000 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1302.606620] audit: type=1326 audit(1761153359.408:3197): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9000 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:15:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541d, &(0x7f0000000000)) 17:15:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541e, 0x0) [ 1302.656001] audit: type=1326 audit(1761153359.408:3198): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9000 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1302.664022] audit: type=1326 audit(1761153359.409:3199): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9000 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1302.671928] audit: type=1326 audit(1761153359.409:3200): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9000 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1302.675389] audit: type=1326 audit(1761153359.409:3201): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9000 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1302.678825] audit: type=1326 audit(1761153359.416:3202): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8999 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1302.686627] audit: type=1326 audit(1761153359.416:3203): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8999 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1302.692628] audit: type=1326 audit(1761153359.416:3204): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8999 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:16:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x541e, 0x0) 17:16:21 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:16:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541e, &(0x7f0000000000)) 17:16:21 executing program 6: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x1) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f00000001c0)={@multicast1, @local, @dev}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000001480)={@multicast2, @dev={0xac, 0x14, 0x14, 0x41}, @remote}, 0xc) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x5c, 0x35, 0x100, 0x70bd26, 0x25dfdbfd, {0x15}, [@typed={0x8, 0x2c, 0x0, 0x0, @u32=0x20}, @typed={0x6, 0x62, 0x0, 0x0, @str='+\x00'}, @nested={0x1c, 0x93, 0x0, 0x1, [@typed={0x8, 0x19, 0x0, 0x0, @pid}, @typed={0x8, 0x87, 0x0, 0x0, @ipv4=@empty}, @typed={0x6, 0x19, 0x0, 0x0, @str='@\x00'}]}, @generic="f15a7de253855904100641746d74bdfdbe9a43af63e1a7b61ee57d25"]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000081}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000280)) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) add_key$keyring(&(0x7f00000004c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0xb, r4, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000340)=ANY=[@ANYBLOB="090000000000000050626364b35bda65666768696a6b6d6d9fe6a8210a691ce4c3c55b8b629a572988b0d6a58cee3019c4edf5959df1165fd5a3d32c6714c74c5b6756963501cf49929705ed16247b0d2323416498186eee94c4713f8d1970d2ffd6289a25b31011ea6cf13dba3c7b75b1418bfc11023c454a14acb294671306304b12b8287177e8aa6c4a7fd69cd6fda5a4762983b845e62d1998a39edde73d9ea541539f14cf99b9"], 0x18, r4) unshare(0x48020200) 17:16:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:21 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:21 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:16:21 executing program 1: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x1001, 0x3fb, 0x93e, 0x3, 'w\x00\x00\x00\x00\x00\x00\a\x00', 0x7, 0x40}) r0 = socket$inet(0x2, 0x4, 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e21, @remote}, {0x2, 0x4e20, @multicast1}, 0x21, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000100)='bond_slave_0\x00', 0x2f09, 0xfffffffffffffff7, 0xfff7}) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000040)='veth0_to_batadv\x00') socket$netlink(0x10, 0x3, 0x0) syz_mount_image$nfs4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000001080)=[{&(0x7f0000001300)="70b08b8284e80ee9f591163d27a7b7513a3caac35cae1cb3a1a642304c2077978619af65cda1e00fc25d4c67e8a4ff5088f7d40994183f1b301190c722f8fc8511221bf510e3d103a702d3a9f7797083b8465c34149a2f83ed5aeea8f25893df0a5f5d53603fae7dd2f130f5a7da9ffef7d69c074d4b61bbe3993401c3b98962796ca34a3c313be9cf0293e84f5485a1b351fa8e96e946311725ccf63ba2f9ac495a8cd9b867f3fd9aed01622543dc4d3b68e0995feca62f83b8a682f5d51493b1becbd8e99a63d3236daae8cc4b9064281096a425a216daf7f2123c7856f99bc60df9c00fa146a0d237faf5d096edc2c7f5fd55cf", 0xf5, 0x8}], 0x80000, &(0x7f0000001100)=ANY=[]) r3 = openat(0xffffffffffffffff, &(0x7f0000000980)='./file0\x00', 0x268c40, 0x108) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000011c0)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000140)) dup3(0xffffffffffffffff, r1, 0x80000) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto(0xffffffffffffffff, &(0x7f0000000280)="0affee90d7e00257", 0x8, 0x400c004, &(0x7f00000002c0)=@caif, 0x80) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x568ae171, 0x0, @perf_config_ext, 0x848, 0x0, 0x7397, 0x2, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) dup3(r2, r1, 0x0) [ 1324.803141] kauditd_printk_skb: 21 callbacks suppressed [ 1324.803164] audit: type=1326 audit(1761153381.621:3226): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1324.817668] audit: type=1326 audit(1761153381.621:3227): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1324.840651] audit: type=1326 audit(1761153381.625:3228): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1324.877604] audit: type=1326 audit(1761153381.626:3229): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:16:21 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5421, 0x0) [ 1324.926373] audit: type=1326 audit(1761153381.626:3230): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1324.941228] audit: type=1326 audit(1761153381.626:3231): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1324.948615] audit: type=1326 audit(1761153381.628:3232): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9025 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1324.956774] audit: type=1326 audit(1761153381.629:3233): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9025 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1324.969256] audit: type=1326 audit(1761153381.629:3234): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1324.977532] audit: type=1326 audit(1761153381.629:3235): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9031 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:16:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x541e, &(0x7f0000000000)) 17:16:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5422, 0x0) 17:16:22 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:22 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:22 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:16:22 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5421, &(0x7f0000000000)) 17:16:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5423, 0x0) 17:16:37 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:16:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:37 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:37 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f0000001000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f0000000240)=[{&(0x7f0000000700)=""/222, 0xde}, {0x0}], 0x2}, 0x0) r3 = syz_io_uring_setup(0x54e1, &(0x7f0000000680)={0x0, 0x0, 0x10, 0x0, 0x250}, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000600), &(0x7f00000001c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000040), 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/cpuinfo\x00', 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040025bd7000fddbdf2552000000050088000800000005008800020000000800cb00080000000500880005a10a0000000a0006000802110000010000050088000100"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='pagemap\x00') syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000280)=@l2tp6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xe}, 0x4}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000500), 0x181800, 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000480), &(0x7f00000004c0)='system_u:object_r:ptchown_exec_t:s0\x00', 0x24, 0x2) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) flistxattr(r3, &(0x7f0000000800)=""/4096, 0x1000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffff7e9}, 0x0, 0x7681b961}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:16:37 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:16:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5422, &(0x7f0000000000)) 17:16:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0", 0x2d, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1341.005924] kauditd_printk_skb: 69 callbacks suppressed [ 1341.005938] audit: type=1326 audit(1761153397.824:3305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9086 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1341.014670] audit: type=1326 audit(1761153397.832:3306): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9088 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1341.020153] audit: type=1326 audit(1761153397.833:3307): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9088 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1341.033074] SELinux: Context system_u:object_r:ptchown_exec_t:s0 is not valid (left unmapped). [ 1341.037174] audit: type=1326 audit(1761153397.842:3308): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9088 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1341.063490] audit: type=1326 audit(1761153397.842:3309): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9086 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:16:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5423, &(0x7f0000000000)) 17:16:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5424, 0x0) [ 1341.079596] audit: type=1326 audit(1761153397.842:3310): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9088 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1341.104145] audit: type=1326 audit(1761153397.843:3311): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9086 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:16:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f", 0x44, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1341.119657] audit: type=1326 audit(1761153397.843:3313): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9086 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1341.128599] audit: type=1326 audit(1761153397.843:3312): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9088 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1341.142216] audit: type=1326 audit(1761153397.844:3314): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9088 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:16:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5424, &(0x7f0000000000)) 17:16:38 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5425, &(0x7f0000000000)) 17:16:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:16:38 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5427, &(0x7f0000000000)) 17:16:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5425, 0x0) 17:16:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5428, &(0x7f0000000000)) 17:16:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:51 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1354.316155] kauditd_printk_skb: 89 callbacks suppressed [ 1354.316166] audit: type=1326 audit(1761153411.134:3404): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:16:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5427, 0x0) 17:16:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5429, &(0x7f0000000000)) 17:16:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) syz_mount_image$iso9660(&(0x7f0000000280), &(0x7f0000000340)='./file0\x00', 0x7, 0x3, &(0x7f0000000600)=[{&(0x7f0000000380)="4a15c213b3b733801b36de4ed359ee621a62fa68dc5a93f475ea0af9f241cfba31620d291448a999b0560bb1972e92f89099c44ee72318de8c13b4e09ede375dd085f0e75dc4bbfa59268939c1864a65d0df9f461bda9690c502ae00cb3ae7854dd0ca953bd8c9d965268a", 0x6b, 0x6}, {&(0x7f0000000400)="f12972b4b21825ab762634d2f2578008cbc7ff1077d329b45befe25176", 0x1d, 0x9}, {&(0x7f0000000440)="68f5c0632b79e9ef2a35c677e46cc4a46cd5cc1d1ac1c255a51e313c318c1153a30f38963824cd36280bf8fd492620950a0e982950f4da4e8dc20153e6336274db6c818d0b53e7f717537932951d304082d86596f5e397e36fef82a1926270f116edd9a044f1300811e93b817901", 0x6e, 0x9}], 0x10840a5, &(0x7f0000001e00)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYBLOB="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"]) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000980)={{r0}, 0x0, 0x4, @unused=[0x7, 0xa7, 0x2, 0xe9], @name="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"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x3, 0x0, 0x800000, 0x8}) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file1\x00', 0x5c3, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="fec1fb908cabeea7205ae0526997113ebc315cba7c94b99c7d980e781753c9a92499115bd3699d0402f80cf682", 0x2d, 0x2}], 0x1000440, &(0x7f00000004c0)={[{@shortname_mixed}, {@shortname_mixed}, {@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@nonumtail}, {@fat=@time_offset={'time_offset', 0x3d, 0x1c8}}, {@shortname_lower}, {@fat=@nfs}, {@utf8}], [{@obj_type}]}) fallocate(r1, 0x8, 0x4, 0x80000000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001b40)={&(0x7f0000001980)={0x1bc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x1}, 0x8004) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c65302069736f39363630002073656341726974792e6361706162696c697479000a89e9acfbd22beca3a183337876994074620f635eac3efa8ed49fab22d831e4c0c6507fdae851da3b3bf487b56264b92e8b0192191c071ece6aa0deeb52320d423e9c684d349b7f2a0d54ed0d4ee6f2807e"], 0x7a) 17:16:51 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:16:51 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000480)={0x1c, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r2, 0x2ff, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 17:16:51 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1354.325106] audit: type=1326 audit(1761153411.134:3405): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1354.335087] audit: type=1326 audit(1761153411.140:3406): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1354.351247] audit: type=1326 audit(1761153411.140:3407): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1354.391342] audit: type=1326 audit(1761153411.140:3408): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:16:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f0000000000000000010000", 0x4f, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:51 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:16:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5437, &(0x7f0000000000)) [ 1354.424307] audit: type=1326 audit(1761153411.141:3409): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9140 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:16:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5428, 0x0) [ 1354.450466] audit: type=1326 audit(1761153411.141:3410): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9140 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1354.475014] audit: type=1326 audit(1761153411.142:3412): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1354.479587] audit: type=1326 audit(1761153411.142:3413): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 [ 1354.503610] audit: type=1326 audit(1761153411.142:3414): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9128 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:16:51 executing program 1: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) syz_emit_ethernet(0x11d, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)={0x0, 0x2, [0xacb, 0x6eb, 0x7a, 0xf58]}) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000640), 0x2, 0x0) syz_emit_ethernet(0x1022, &(0x7f00000017c0)=ANY=[@ANYBLOB="305512aacde5ffffffffffff8847000000000000000000000000000003004efed90e92ba7499cd1ee7426570fe7a58e42f2fe927afc1a60267ec66f940819669c6066fb58a5510f0bc5c3688dcc687998cf8e151512153e91ea37ab1c892009f3ce73a6a980d304a83d91584493982a9c267219449dd642c6415b4bdb0e6aff53a5aeaed805a57c9b8034c616fe4d1c545503a17f4f49f61d292486fb9327aa575240429c4243eb4fe4aa51a78c7014d76420f5f78318fe052c8cab39f1961328dc059a4439989ea231b02704926707fb65ec65955947eba48fc006ffc2dccff4532517174466d308d07c6d5dc7d0ae64b318b8abe8459f7000b391be00a0718bb6cc99e9221005d9f85a2a1b3dde3edf0daa3289dc1f0b747ea5af8a3da500120ce9c60eb94ebebd59d1edacc3c23e0dda823b85c69bd7d2efb3d206830b28ca8d70b3e5e81974f3950c42a99417e4eb12810b4d6f96889dac71f898b7560611ebabc833afec2bcdec53a5c600f8e90b65cd54a7b4acb2a04fa833af18138fd55b2fd1af6e867f75f7dfae8c3e44fd2962cb174bacfd71bc387c93b4f5d37f6771289063ebf7b1b4a0b25de65655e9f6030f6edfc23f4aec827b071a72c7bd3f8e7e90dd0de5ccea1f4737d69f16f7a47188532800033e7cf03bb753b1b2cb468b86b487c57abdd5de0840632310834e94bc3907e245cb23022028b854434d6ccc9a96e975089b6341a3a7f8a1fbfd06d012970a5be4b966501e5d838c69d543c540c569b18fcb2834e5d33959d4e224c69cb4f1ecc4c943380cd73ec770a08151bdb7ea799fd5acac4c15a22046acd03790f992837e19950b55165869e04ba5af0bd165d01c908b6cc70d9f6bd57797d92413dc102a20d16a657851c3a1de9ff481649e34968b36d696a81b44a65682c3fdaaddc9deacee4c6763a69594e16d805e23bcacbc09478fa10a501d6f6c4ee5863da2891a899bec4bded7166049b879b9a8ffb2d6e7787deacfaaa2ad53e3a1a7b33eb350ac0e455b2246418e6aad43105058dd8caeceb1c642b5a0de07204a2cf5f3c1bb97d6fa54f3e39acd77e58ee7587b4bdd95bfcd63c7b528791aa19dc29219f2631db7ffecdda99ec524d90c6a66c0a2fa96fb168722fffa84654b302ad61ea1ad244af83be5960629d94549dda40958bfdd99cf956aaf1f65d563aa1a69a020190fe6503e0a1642a1c2639cc18a2bb2894801ff2560442698cf595fd185bd74eb811f311c514b346bf784719f32cd2acee78ab358024c13f1afa91230073b2a0c696afaa8ad3b266d60d3f387d382e73ed241ea9f0107be8a8003ee8bab83533559a5b97839b1b6238157eabdc9dd9ea4e865ef8211efcfff7baf75de516d9c75772720b189d7be3272bf03834721b522d6a3ede3d7509b3ea7dd685a6c0d564f48d73b457b389920357848ea80e1eb73604899484b5a3974c37ae4fdb71aba86ba182ad47e4a7ce5a8a9203eaf9fffcf5d3cff37c364b0366996515f9276d3d1779726dddad4a2c5dae0c1f4a2ab995f73024348af08b699687df182d5965f23e2dfc9f85dcef25cd2a1fe30f3eeb8bb8c518a0836bc024fa8927623dbe6106befa8204cb8fcbe0bec84aa253b473d4013c5f50445ab102690be1136911f91e4121f979a96d9bcc472f166da1a80cb0fa905b7004acd71c33d9874fd2a66f100d3eda700e76ae80a302f0fcfe18baff3c0b67cc71795972dbb5a7c0e89ea07cf8652db67d3d5c19e8f6030ea6c85f417ac5dcdd8ccce7e14b546bcae5101006201130b518a7cf57cac383b9c1708b95f96c88835a598a7f56f2b0e769d19fc651f5c94782f51ba732d3d349ded69f1a20f37f2fa7f20e7d0c95a40d36d52e0abdd9288217e04eb1b33aca6b1b86ff372a0295d79938ba2b9e6251dc7e8746731367d57472c39d62e7ee7554a0e1163e4d3b03381ad76481d0e7074805ae641c6637c4e57a1c5713718a50cecf47ed0a757062f434cb38123572cbf8033ece4618b0bf1daaa5bd4e97bea8bb53ff9df6f8de1b4f249a64f92281d0bd07a3aa9dae60943b1269d6f3426da6a0f18dce04902c31317451e03a7638000958d66672102f1d2ce024c018eb23cf9bedbb4a8ef4a39aaedb3f7c72147a1a0382596826d82a6f66b03e33beef8a8de9031484fe2b3fba21c59490785709ab3d72f7a4e12f55040b1f76bbc295d59d8d8442bbee4dafedea657ff513612a30b860b79df78c92fe98cc23d635a9fdcdd98052285b74fbb766f72093392f8ac0712bf0ebf4c59db7ec8b22cabe8222f0faea9d3f7d779dfb5929155aea9a963d50c64b8a82dfd0e84b1cc1a6be0c62eaf14204aa59ef362a401b4525beacd7a04af53c850583e8de40a27ff795c041911623bdd4c6763de5490e350e53d576d7d515b8f1dc24f47da02c13bf32244265e0fbf22f6263c60017a7d38dd07d6acfe35e53948dfe1331fcc040329f03c0db53becbaa67ae6f80628791272a24cc3638ade6da8cafee1d431c770bc4a22be8bbac8f0963b7339a7413875b679777da5f8f7224913c05afc9987314337a4805aa552cf6e0ec9721758479e997783d95862b25beb3537b666b28bd98de096439d781bff918bc696f8b64b404218a14c7b2ea9159486da5b0d00ec6775dfcb24381e1b786e5604d21114515a220b033095acb8a64907240e47e4f45bd8dbd6ddf1c276666ab755fff903d2a3fb253b17021c7700f683318b942206af7d8f97743bbd0f474af0718bf77785daa95f7121e0f9e6930e72d4cb2580dac98f6424acb77b72bf63e17272d977890958f192c8b6a8e600f969a27ab7b34ffe6ff5bcd389f2a4b5d09fd610765c7f8526711ceb9de918d11c3186e8d2b0744e0bee8cd8889384bdcd26bcb3e41dd80702e4573e9f05f562cb8c44b6faddee97b9ed43d17cbec5d77b4bd6d36241a78ae8a6c7a525d80bc9f061009c3019a4592d4ba47d8824176b3b357ed2941aba530ad582368bb31e9e6d1422ccf1fca9872f3ac17fdcbc66e8f848828c675649e3ecf67a7efb5788698b53a6459418801d837f54ec08e9c8678b140602b4afd44581fb8ee2640d3c55df33e74f7cbb31360e8af218af173efcb8463eb7fb062b4a32762b9e86facbce83a4dbe054b9a421b2db7e80c08addee7a78529a5db6d6896328c7f9b92c342add60eff7349591f4fa1f2031ecd6f39bafeccc567c7c15abd93d6fb172ddcb050e1f2dba1aae5be8d13a8a3e5dd9c65538800fdb89c601697b635bfa39d41292700c7e86c6a559db29570aa53e5e28eb9907ec46317816bbaf809a421751f81ea76c8ee6af6644c18b14b47ce10292a234d76906b4b93c26fb6a0f08086691b0263a2743145b8b669d3d941df154a3b4d9d05dda1e2a726ff0a6a86778d3deaffcc8938f15ee978d2b9186c5245e16e66854d5cdaddba719850748ad5ebb35b3acb2ca7cb530896226283f1c6a700ccdd1a5cad005c7fb735ebfd77d37482cd38392a14bb8d77da129fd9a63bca2632a149876fd04a603d62cc60c142d792116e5ae869a7f4202bf554a06c9cc3f929ed23360e90b07499d1a3526325e53d7ea1ed1786078731b933b60a19b7e822506058fab1531975d64e2082022dd81d9d2a5a9a078f538525c6b38346cc4d80d4b255c548f90cd90101375ac838683e28f580e4faea2dcbc1fc15e245f22453b72a409716676b15c642434cc07d8ae8d7d05432efb7b32a8005265f9d3bed3cbc04bc738f748057832879b8d146ee6d2ee0b50fc629e5af47c2313e6b77f311e9758a7fcc22c4d348815264eab59fbd3ac05c0cd797033e346acad2018075768f105e74234d4552984d0d1761670f91b956e876f838447b85ecacf791e69e20472ccdcaf4f2abe202fb4299e31251c061f089202cb6a97947c95bb350bfe8dcaee0b1584b3874581a2050df5e0bc2afba14b3a539784aad43c6ac6f88571c2b972ed943c3d58281c4dd5499d5090305d99636693bd5e09670f38863a40b8aae16fffded5b23bc0b6d31cf60612e74d2aa7a8ec32edf2b99599c93fa9d750e773e9b3fda044a8b1fcfdfc9841b00f1f1181ef101f2d4fb4111de701ffc115e7dc4787a39f17dcb5ccd65e2c2c5f0c3ee3a75a01c89272ab61726c5bbe2f846b6569a4a0aac78bf565a9aa813cd250772d64d8c0beb861bce7869f671e5d52b67aca5b7c159f0494f85eb07fb5bf2379203e54218d3763364cab105eb9ca12d620c1dbc6501f733de84a3fde80e74f0f4fc156979888084e3dedbf9524f7398fe70c1e69a0e3c22b745353989be6ccae488e9e3ef0c043a98d7ef578667bb3b5bdace9f096dac3c667179d9978a59fbf9c07ff99752d6660e422d199524ae434e75b93cabbeaf954655121de74a5d2abeef1dcdaf096271d0885c3b516eafef2433cc06f5608d248b994585ce4cb473d5edde82f4c50603bdee087720a622ba258b065bc8c693705d6a592f179181c94502f02380e9298e127197a1903be91596012bb74e818ef34b376fabd77f45f5d94480526f7cee06f278bf9c16e5a373569ce110bbb5b7ee70be023701d7a6790c1ac954ac62182fea618bf0c36eeb66b7ea870ebcd1a4bd21d2f992bbfa62cb131153e0eda46d6e26f06e188867db97b5c84496bcdd733623a1189b555e270a9c3ca42cb06c10bd972ed54597fee2b90f362037f0066d6b4a2990463ffd60f47fd660ba4b01fe93da86b8a5a7627f4ca7dbc37a3c3135e8b7cfa31da3b55064edc7bc83975f0e6f7d2304f3cf3f96969f170a3e1d8e676d34804370eff6a72839d17692b365e8e441b730735f121089f557b1bbd78d9a1006c3c79eae89e2f79bbbfbf9e42b6b9ffb0b80592c05eda586506f22f3e14b5703e41b112f5469c841305bc84b491f0302c3750bebb1838f81f913601bf398eef7e391de8d18d7776f98aebf80dbb2c94ded827bb23bc8244469e72f366e2709f2d99b0091e0f812906e01aed377b49d03d82894ddc6a6da8a696bed880171927698c6bba5945262b28440ad8d2dc248618b4dbd5317b71753ebc2a7a6a469358b8336d0a1893574bdf579390a6739d136fc2f7ce2e12bc2009d93c6bc4234dd177e83a1b41c537348bc443c03bdb518c793c8f66d164e4ed4afad5792d481c6b5b25c8db23b097a1f89faf94a21c9ff4424d7c9d8aa320302077180ff5fa24e55ba91c8fdb90e094a7551480dadf3a95233dd5dc35ccd306c55f7a7b794c1b2f40e2968a38930ac94a31d1f2c55531be05f206d80de438dfc0d365028d86eaa9c474844589f24597d5f7b082522f656dc005bb184b0d3fc0275f37686134b0f33a61c990c33040d26348d681860fd397a8a7a2b3b7bf68f14bc25502f616bffd57384ff1422bc801e0bbcda6a7607640b3534dda14808a9fe9494fc63441c320663c34f95f990c4311d406e0abfd354971674fa3e8df0ed5e4404350aaf245ba3308eeb7644ac3ed4547d806a2ab15acd86970b088fb3093b8d53001a76f3d9b9e02f1e559421ea8b79db5dc3a29219f48af8f48b94f419b040c0ea00b78d1329d56a17c7399fb2da63c2bc81fef37dd50e5f382b7d05b5e50def8e7a4396ab78f651801213c1baf729d88f06c6043ed5f801f8a7391fcfc39ee13bad93c3879c23d00f6428077c5f73a0e9b611bcaf61cdbaa85768281ab12e1b5396c032fd19a49f0a3b67a76eb8fe6fd8a2f2b2461bb4ff489efad88b5e9657804a63b7001e969caa7fa44338bf6f84719a4e656dc24b7f6fb197b23d79326bd8ce0365ff489d13c2f578c07741ac5415d7160d6a1f88de758a5d1ed473604ae660e4087d1bbea50075539e971506a04348f840930dd5bf874fa06bd5d69fbd921bb3b4918b520232f26016ec8046c910d5dc59867d0d8b1f4cc9cde1f50e5238d39a48ebeb330a008c42276cb3b1c95fca91c0a94bff1b5b2d2f066a17904ba40b506f817a0d54398a2c57d4c836d8f6c70c1d335974756e7d617da3dd35887dadb16fe384e886286cd443a09f57953c0743c1421e5255e6592594fed11285"], &(0x7f0000000000)={0x1, 0x4, [0xa02, 0x810, 0xb05, 0x83e]}) sendfile(r0, r1, &(0x7f0000000680)=0x7ff, 0x9) fsetxattr$security_ima(r0, &(0x7f0000000140), &(0x7f0000000180)=@md5={0x1, "2b592e6f70c12ebfbb16ba0f75332b28"}, 0x11, 0x2) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x400600, 0x0) fcntl$setlease(r2, 0x400, 0x2) fork() r3 = fork() wait4(0x0, &(0x7f0000000100), 0x2, &(0x7f00000001c0)) ptrace(0x10, r3) wait4(0xffffffffffffffff, 0x0, 0x1, 0x0) r4 = fork() setsockopt(0xffffffffffffffff, 0x800, 0x0, &(0x7f0000000280)="77f7afe7e67cdb79c63c82bf249887198293ea2bf8f6217799fccf3a0f7ba4a4075b7121230d05af4317399c1011a3c1f891a22650fdd97ce140008a2191953e14f5d0d21b87e0062eb87ef10305e3559e9684a503a13dc61d219da4e236b9896da10d3a4280cd69def85ec10e67300398db3765fdd595459b63b91bcc6f057931f0e39f7de34ab6e6b650752c1882384d672f22eed473db2456e5938954acc32673e9f4c1c898a0f64f164bb3bd2e42b72ec9bcd4196ca0f8750bfc6185f5496addb42c2a14283000b8", 0xca) wait4(r4, &(0x7f00000000c0), 0x2, &(0x7f00000003c0)) 17:17:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5441, &(0x7f0000000000)) 17:17:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) timer_create(0x6, &(0x7f0000000240)={0x0, 0x0, 0x4, @tid=r0}, &(0x7f00000002c0)) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) write$binfmt_elf64(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="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"/1806], 0x712) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f00000000c0)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) timer_gettime(0x0, &(0x7f0000000100)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r4, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_settime(r4, 0x0, &(0x7f00000004c0)={{}, {0x0, 0x3938700}}, &(0x7f0000000500)) 17:17:08 executing program 6: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1d}, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x6, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x40049366, &(0x7f0000000080)=0x4) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000f21d00210c00000004000200c9ed92fcf5f00506981e0a1160bad8f739e688934a3abca39f64f7b93ce10736909c09b01c5b976361482c331980ebb8d11112af8cbc0566d56a39ce0e4f3b5fceb3e0cdcf90fb8eaa370885cd183ed4f20dc94e4493bdf358c6664c5249940fb3f85b0d0000000000"], 0x14}}, 0x20040000) 17:17:08 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5429, 0x0) 17:17:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:08 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:17:08 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1371.847604] kauditd_printk_skb: 46 callbacks suppressed [ 1371.847623] audit: type=1326 audit(1761153428.665:3460): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9180 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1371.855088] audit: type=1326 audit(1761153428.666:3461): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9180 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1371.874155] sg_write: data in/out 327644/1768 bytes for SCSI command 0x0-- guessing data in; [ 1371.874155] program syz-executor.1 not setting count and/or reply_len properly [ 1371.897376] audit: type=1326 audit(1761153428.666:3462): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9180 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:17:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5437, 0x0) [ 1371.936660] audit: type=1326 audit(1761153428.672:3463): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9180 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1371.981062] sg_write: data in/out 327644/1768 bytes for SCSI command 0x0-- guessing data in; [ 1371.981062] program syz-executor.1 not setting count and/or reply_len properly 17:17:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5441, 0x0) [ 1371.989206] audit: type=1326 audit(1761153428.679:3464): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9180 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1372.002901] audit: type=1326 audit(1761153428.689:3466): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9188 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:17:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5450, &(0x7f0000000000)) [ 1372.016705] audit: type=1326 audit(1761153428.697:3467): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9188 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1372.037482] audit: type=1326 audit(1761153428.702:3468): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9188 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:17:08 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1372.060128] audit: type=1326 audit(1761153428.679:3465): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9180 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1372.078855] audit: type=1326 audit(1761153428.704:3469): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9180 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:08 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r3) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r1, @ANYRES32=r2], 0x6c}}, 0x4000) 17:17:08 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5450, 0x0) 17:17:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10f) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r4, 0x9e46, 0x0) r5 = dup2(r4, r3) getdents64(r4, &(0x7f0000001400)=""/53, 0x35) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, r4, &(0x7f0000000000)={0x40002001}, r5}, 0x81) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_SPLICE={0x1e, 0x4, 0x0, @fd_index=0x2, 0xfffffffffffffffb, {0x0, r6}, 0x1a, 0x2, 0x0, {0x0, 0x0, r1}}, 0x8) sendfile(0xffffffffffffffff, r4, 0x0, 0x80000001) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000040)={0x10000, 0x795, 0x5, 0x8, 0xffffffff}) openat(r0, &(0x7f0000000180)='./file0\x00', 0x800, 0x0) 17:17:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5451, 0x0) 17:17:09 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:17:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b", 0x55, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:24 executing program 6: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000018980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x28}}], 0x1, 0x0) 17:17:24 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:24 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:17:24 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:17:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5452, 0x0) 17:17:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:24 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000002c0), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, &(0x7f00000000c0)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) getpgrp(0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000fffffdfd020100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d4571082000000000000000000000000000000000000000000824a700900"/260]) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000980)={{r1}, r3, 0x18, @unused=[0xfff, 0x7f, 0x1ff, 0x1], @name="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"}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'ip6tnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="3c00000001000000030015c1e10000030000000220000001dee8fc131fc92b57000000014d0ffee000008068fb93f20624d998bb2382fbef2e605d20efd13ad8020454fe726d5ec494d8000000000000b7382cb035ae"]}) sendmsg$nl_generic(r1, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="d400000014000268e872002a36e58c2516000000309195bcedd4a355ffd0b57d36c80aa3cd5c00a209ab410588e2acf39f612a058aca019d424c1cfefa9bd84118e7b9a3dc7b648488e3b314280151f16e53c3b34d356001432e0e37dbfac2e264d49dde22ffb05d71782e4588a22964e120c9b3e8ac10a180903c642a26553943488705f8f9389f0dc82f10989f62b3874701ee49da692b47f3a2374ddcf5407ac1d8d6ece93e8156a83bca75748906b35121f4bfbcd532464798ecfcbf0151eccc1703000000e09aefabad56510f51901f721fb776488673f91400"/230], 0xd4}, 0x1, 0x0, 0x0, 0x8010}, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000980)={{}, 0x0, 0x18, @unused=[0xfff, 0x7f, 0x1ff, 0x1], @name="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"}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000001e00)={{}, 0x0, 0x8, @unused=[0x3, 0x3, 0x3, 0x9], @subvolid=0xa77}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x82000, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000880)=ANY=[@ANYBLOB="010601060000000000000000000000000000000000000001ff020000000000000000000000000001fc000000000000000000000000000000f88226a91f8b26296906a7c6112d7c23cc1890b9dac6ad76f124cc078544b156c06a4b5f643402a388b7b6ede5be94169040c873919189f0bb22567c3a24bc8125a2e76bd2b3104ebbdb6802785a82b050ac7fb3228ceb0b614ec31cae8c820bae862312b19eb847822245ff0be847d669f25a0ffc03bce9499a5dbcd92b9d93e2314ecfcf71562229babcb88fdce82b9783e2c30ebcbb0b8b28701efe37da5c"], 0x38) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) signalfd4(r4, &(0x7f0000000180)={[0x9]}, 0x8, 0x80000) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x5, 0x81, 0x0, 0x1ff}]}) prlimit64(0x0, 0x6, &(0x7f0000000440)={0x4, 0x16ba}, &(0x7f0000000600)) unshare(0x48020200) 17:17:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5451, &(0x7f0000000000)) [ 1387.239189] kauditd_printk_skb: 58 callbacks suppressed [ 1387.239208] audit: type=1326 audit(1761153444.057:3528): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:17:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5452, &(0x7f0000000000)) [ 1387.249256] audit: type=1326 audit(1761153444.057:3529): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1387.275545] audit: type=1326 audit(1761153444.058:3530): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1387.287498] audit: type=1326 audit(1761153444.059:3531): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:17:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1387.306035] audit: type=1326 audit(1761153444.059:3532): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 17:17:24 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) fcntl$dupfd(r3, 0x0, r3) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f00000001c0)={@empty, r4}, 0x14) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r2, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r5 = fcntl$dupfd(r2, 0x0, r2) sendmsg$inet6(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000200)) [ 1387.332772] audit: type=1326 audit(1761153444.059:3533): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x545d, &(0x7f0000000000)) [ 1387.349174] audit: type=1326 audit(1761153444.059:3534): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x545d, 0x0) 17:17:24 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1387.377712] audit: type=1326 audit(1761153444.059:3535): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1387.385113] audit: type=1326 audit(1761153444.060:3536): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1387.421669] audit: type=1326 audit(1761153444.060:3537): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9246 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000", 0x58, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5460, 0x0) 17:17:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5460, &(0x7f0000000000)) 17:17:39 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:17:39 executing program 6: connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001700)='net/nf_conntrack_expect\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x4001, 0x84) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000000)={0x67, ""/103}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000100)={0x3, 0xf5c4, 0x3, 0x0, 0xffff, 0x9}) ioctl$KDGETLED(r1, 0x4b31, &(0x7f00000000c0)) 17:17:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:39 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:39 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:17:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5600, 0x0) 17:17:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5600, &(0x7f0000000000)) 17:17:39 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) close_range(r1, r0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000003c0)=""/4, &(0x7f0000000400)=0x4) fcntl$addseals(r1, 0x409, 0x8) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000d40)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x28, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3ff, 0x2b}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000080}, 0x4) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000140)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef0397c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024d4751fcbfb4d3ec4b7b6dc1", 0x26, 0x0, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48020200) [ 1402.805017] kauditd_printk_skb: 62 callbacks suppressed [ 1402.805037] audit: type=1326 audit(1761153459.623:3600): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1402.820756] audit: type=1326 audit(1761153459.623:3601): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:17:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5601, &(0x7f0000000000)) [ 1402.852779] audit: type=1326 audit(1761153459.626:3602): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1402.883461] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1402.891721] audit: type=1326 audit(1761153459.630:3603): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:17:39 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) [ 1402.929106] audit: type=1326 audit(1761153459.630:3604): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f8028ff5ad7 code=0x7ffc0000 [ 1402.945350] audit: type=1326 audit(1761153459.630:3605): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1402.960261] audit: type=1326 audit(1761153459.633:3606): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1402.990347] audit: type=1326 audit(1761153459.633:3607): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:17:39 executing program 6: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6d706f6c3d6c6f63616c2c00fd6a13b124ef55f2f0a70dba7df804a4edf5780c78a66b9003d07818abe3060900000000000000406e039f7f23f9cb5612fcc422b582ced5600c56577a1fe8cca59cc64cf3eb86a55f85af754d0cccb200100000642839e6f5311d4a648adf36d10006f5eacec080d4e55dc50860cb0f201759bd0c01a716f73a8dab8692959685a569204f398abb97b46ded66a818a1a44bcdb5c23730916ea370163662f56a0ee27f0c3dcd2be4cbe0b2ec00"/197]) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000002, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x14}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x2229, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x3, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000001680)='./file0/file0\x00', 0x0) pwrite64(r1, &(0x7f0000000140)="b2", 0x20000141, 0x8001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x2, 0x7ff, 0x0, 'queue0\x00', 0x4}) 17:17:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5601, 0x0) [ 1403.009718] audit: type=1326 audit(1761153459.634:3608): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 17:17:39 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5602, &(0x7f0000000000)) [ 1403.042486] audit: type=1326 audit(1761153459.636:3609): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9294 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f8028fa8ab7 code=0x7ffc0000 [ 1416.135952] kauditd_printk_skb: 33 callbacks suppressed [ 1416.135997] audit: type=1326 audit(1761153472.953:3643): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1416.149911] audit: type=1326 audit(1761153472.955:3644): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:17:52 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 17:17:52 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:17:52 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_submit(0x0, 0x1, &(0x7f0000000400)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000540)="4fa961a32c46292c4c203b03c6cfcb7f41a36b2033c451524efa095f3259d324fe60cf5baa606c7c29d5626c6a425a3357a6ef9b122793056fe62dc737af44a1070dcbaede3f1a1a803aeec79b506e019ba9a0faad0ffeddee88e9c7f880a2b88dd7ec8a16c3670691b02178a9efe72a78120600fe8be129a52b1b4d82cc8adf2f88522df22ee2ca034bd40b6be1e2b77c7b9594a599c877", 0x98, 0x0, 0x0, 0x3}]) r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) syz_usb_connect$cdc_ecm(0x4, 0x0, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000440), &(0x7f0000000700)) close(0xffffffffffffffff) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000140)) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000007c0)=ANY=[@ANYBLOB="24000000010000001800000017266bf5b3cd6e5998b5f1d9ec9b2fa5b97107a20f6ed27105e391fa7a64063a798d09f2d3013e393b5a1cf170eb90ca23bcae226830dfbb72ce7559ba799857a4712e090dc9fc194c1f3b39853a5a44e325871be45919cd39875df9f2f7a30aa8e84a16c741fd17bf70c3a8f2014af5fa3406000000eb4fe9b88b95acedfa6c50d4151e8e0ed08c000000000000ffff486f885a5c3e8807163b0f45f2642387", @ANYRES32, @ANYBLOB="00ed04000041899b09e5cd54b9d40a39fe4423ce044ef83b36adbb9a713c70dda2d0df05d200000000000000008cb54e1307bb05187b1f595684ce1b6cae83cb548c5cc32962210749157a7342f9300e4901e59fa8ba33b623eb88d8128813edf545fc66d0a66047c4feb9c68c9a8b2769018ed3337e4fdcc5a2a9cdbac31e1a89efcbc01b94d1955ae46490ac26e5c07e3bc3cb0a5844ed7cf24990ed43323c959f1b06b670ea3efad68cf93e20974c1adff596ebc1f9e0a5c34b58ac07663f456cce5d305e3ee9b60115ff144283608ad859f500"/229]) clock_gettime(0x0, &(0x7f00000000c0)) timer_create(0x9, &(0x7f0000000080)={0x0, 0x22, 0x1}, &(0x7f0000000380)) timer_create(0x6, &(0x7f0000000240)={0x0, 0x4, 0x4}, &(0x7f00000002c0)) timer_gettime(0x0, &(0x7f0000000080)) timer_delete(0x0) clone3(&(0x7f0000000740)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 17:17:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5602, 0x0) 17:17:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:52 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:17:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5603, 0x0) [ 1416.169945] audit: type=1326 audit(1761153472.955:3645): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1416.175889] audit: type=1326 audit(1761153472.955:3646): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:17:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000", 0x59, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) 17:17:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5605, &(0x7f0000000000)) 17:17:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c901a7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1187b4e1f5a7bf5116e03f38056144e579e46004fbfb9ae99572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d806f272170c0011000000000000000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6d0eae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c3c2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044fab0a3ee36278183e00f05d56ee58c70cc78f1fe11e55c898d61e09dd9ec4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb39d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b85ccc521acda794895462c77f5ff370f89a2e870f5d485e58951dd7d1e27236dc52ce2c5ad9c73e0a61401a4a516c41604d7981f0c5d28db9d69e06008070a1c8a29ab4b046f86a311abc00000000000000000000000021d58c77edb293cc9578f585bdd701f9ee2106436f5fcf55fe6240095b6b3d472798f8f9275542afa54cb35bead6ff060000acfe22aecf3a338b66d6b6d7493b92b7504ee04560f3f09be3740b31fc8e83b0d8d71b009490cc8c05463d87a3dc636dd21e096d9d81c6d82e6476e7d92eac37b40eabf6c87bcf97f4e81c20d6cbc305948014b499ce164cd61e37a219f9e9d6192534a1e19508041dee4e6388131d075a48f73d985675042259c55328516aa0d7714a86cb42c54b353075a75bd6c97f07e67799bb3c4acdf717de323a07b094965969ea17dedd4e913cc697ce6454df791c397f653bc1d2408fe440061011d098bba54b0d10a129c468dc1c556c655499d5a8d997d7ba122c42209860f8dd4e3f2993f60563fbb3017e10130ba23b7a165e98be854f41773afda6d73adb0f00d1a977cbdb5c3cb7e00897420f0df622573b78bd6c04d38822dc8a2c0a34984c28fe9b1b010e182ad77a6d7186202d8177d60129be4d487ab48759eabcb23ff4fc1a149c01dff17dca8148be1662812a000000000000000000f12bd166af71d03a666fc983503a80426cfdb10b343da6b25f6e96fd30debd243c3c1261e3e115c8f38aeca93fb4d37b7cf02467be5c72c1d5b13890efe53d22f446e8f044fc15d3fa39f877ba153960672456415f173300dfdfcb39139b4975cd40eed14dd19aef7edb2a3d6c48e4cc2575c920"], 0x98}}, 0x0) close_range(r1, r0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000003c0)=""/4, &(0x7f0000000400)=0x4) fcntl$addseals(r1, 0x409, 0x8) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000d40)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x28, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3ff, 0x2b}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000080}, 0x4) r2 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x2, 0x0, @fd_index=0x2, 0x8, &(0x7f0000000140)="ef3003e7d4d5730dd9bc0d2116cbd2ec2d4cef0397c67262d0882d05da47c1147ab3a8e1b3dfac797791d00529f0be39c7c3024d4751fcbfb4d3ec4b7b6dc1", 0x26, 0x0, 0x1}, 0x9) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000000), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r2) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x48020200) [ 1416.193567] audit: type=1326 audit(1761153472.955:3647): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1416.199972] audit: type=1326 audit(1761153472.956:3648): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1416.233827] netlink: 124 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1416.252262] audit: type=1326 audit(1761153472.956:3649): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:53 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 17:17:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5605, 0x0) [ 1416.279035] audit: type=1326 audit(1761153472.956:3650): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:53 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1416.310984] audit: type=1326 audit(1761153472.956:3651): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5606, &(0x7f0000000000)) [ 1416.337401] audit: type=1326 audit(1761153472.956:3652): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9332 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:17:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5606, 0x0) 17:17:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x46e2, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) r2 = epoll_create(0x81) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x2) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000000)={0x2, 0x2, 0x28}) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x4004662b, &(0x7f0000000100)=0x4) 17:17:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5607, 0x0) 17:18:09 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:18:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1432.668732] kauditd_printk_skb: 58 callbacks suppressed [ 1432.668751] audit: type=1326 audit(1761153489.486:3711): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9372 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:09 executing program 1: ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) r0 = msgget$private(0x0, 0x0) r1 = msgget(0x1, 0x80) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000400)=""/71) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000000)=0x8, 0x4, 0x0) msgsnd(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x92, 0x0) r2 = msgget(0x1, 0x80) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000400)=""/71) msgsnd(r2, &(0x7f0000001540)={0x2, "fd3f88ba8660ae0de23cf7335a7baed5e2905b0bc9aac94155cae1d4773cce161e80b11c5a5332faf6f4473b0a4d0a488d52e8415aec031a5c9dfe6b9021615405479bc7e18379ad7d4b90f6cf1bd05fbb0e0234187036b3fa11d3217157b5942fe0e8f80a5132124b05dd408fc572cce1e735da19ab9c6fcba6c10d53a2ee007a149c099b0d19e6877c"}, 0x92, 0x0) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f0000000040)=""/240) msgrcv(r1, 0x0, 0x0, 0x0, 0x1000) msgsnd(r0, &(0x7f00000006c0)={0x1}, 0x8, 0x0) [ 1432.676804] audit: type=1326 audit(1761153489.493:3712): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9372 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1432.694687] audit: type=1326 audit(1761153489.493:3713): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9372 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:09 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) 17:18:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5608, 0x0) 17:18:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5607, &(0x7f0000000000)) 17:18:09 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:18:09 executing program 6: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xbe}, 0x0, 0x0, 0x1002, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x15}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000003c0)) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x49) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000400)={0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x34}}, {0x2, 0x4e21, @rand_addr=0x64010102}, 0x2, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000380)='bond_slave_1\x00', 0x8, 0x8, 0x4}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) syz_io_uring_setup(0x160, &(0x7f0000000280)={0x0, 0x300018d7, 0x0, 0x1, 0x30d}, &(0x7f0000fea000/0x13000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000000480), &(0x7f0000000340)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fstatfs(0xffffffffffffffff, &(0x7f0000002e00)=""/4102) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) dup2(0xffffffffffffffff, r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x18) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) [ 1432.720959] audit: type=1326 audit(1761153489.494:3714): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9372 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1432.734757] audit: type=1326 audit(1761153489.504:3715): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9372 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1432.749958] audit: type=1326 audit(1761153489.505:3716): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9377 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:18:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x5609, 0x0) 17:18:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5608, &(0x7f0000000000)) [ 1432.764159] audit: type=1326 audit(1761153489.506:3717): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9377 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1432.778417] audit: type=1326 audit(1761153489.506:3718): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9377 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:18:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ff", 0x2, 0x4000}, {0x0}], 0x0, &(0x7f0000011300)) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x4270, 0x0, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000016c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee01}}, './file0\x00'}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001b80)='./file0\x00', 0x200081, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f00000000c0)={0x1, 'gretap0\x00', {}, 0x4}) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x3000)=nil, 0x1000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000001700)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3, 0xffffffffffffffff}}, './file0\x00'}) 17:18:09 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) 17:18:09 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) [ 1432.825961] audit: type=1326 audit(1761153489.506:3719): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9377 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1432.841762] audit: type=1326 audit(1761153489.511:3720): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9377 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:18:09 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5609, &(0x7f0000000000)) 17:18:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560a, 0x0) 17:18:09 executing program 6: r0 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@GTPA_TID={0xc}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_PEER_ADDRESS={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_PEER_ADDRESS={0x8, 0x4, @remote}]}, 0x60}, 0x1, 0x0, 0x0, 0x4048001}, 0x20000000) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x24508) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x0) 17:18:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560a, &(0x7f0000000000)) 17:18:24 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:18:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x11, &(0x7f0000000040), 0xe7) r2 = dup(r1) setregid(0xee00, r0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400028001000270000004f80100200040000000000000000000800029561eadf153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffffffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffffffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="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", 0x120, 0x600}, {&(0x7f0000010500)="2e2020202020202020202010007deb70325132510000eb7032510300000000002e2e20202020202020202010007deb70325132510000eb70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020007deb70325132510000eb70325104001a040000", 0x80, 0x11400}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkaller\t\x00\x00\x00allersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x21400}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0x31400}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x51400}], 0x0, &(0x7f0000010d00)) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) openat(r3, &(0x7f00000000c0)='./file1\x00', 0x408004, 0x33) 17:18:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560b, 0x0) 17:18:24 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:18:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 17:18:24 executing program 1: sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, 0x0, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, 0x0, 0x24040101) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0}, 0x40000) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x800, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, ["", ""]}, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x20, 0x0, 0x0, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x400, 0x17}}}}, ["", "", "", "", ""]}, 0x20}}, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000280)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2200000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="6f004241aaca46b4de04056d2df0d46b4d4c40773b733ca65d94f53c2ededa6fbba1cfba0b5b5a3b9d324e4c38764404fd52be6b538c36b3558f7a9d587a9a0705b4a059b417d38b225af7b380b2eecbd53b34658bf4634e843a5b993864a328db997e286e1a41ea9a9aca4f28ce29a68f42decd235f3ddbbe6aa2bda2746d0ae7bdeb4f044e1c5ddc5f83148ce54e414f", @ANYRES16=0x0, @ANYBLOB="00042abd7000010000005900000008000300", @ANYRES32=r2, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x400c0}, 0x4000c004) setxattr$security_capability(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000200), &(0x7f0000000240)=@v2={0x2000000, [{0x363e, 0x5}, {0x26b, 0xbcd3}]}, 0x14, 0x2) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x11, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r4}}, 0x6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0xffe3) [ 1447.264756] kauditd_printk_skb: 48 callbacks suppressed [ 1447.264778] audit: type=1326 audit(1761153504.081:3769): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:24 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) [ 1447.277756] audit: type=1326 audit(1761153504.083:3770): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1447.300536] audit: type=1326 audit(1761153504.090:3771): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1447.333902] audit: type=1326 audit(1761153504.102:3772): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560c, 0x0) [ 1447.372790] audit: type=1326 audit(1761153504.105:3773): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1447.404713] audit: type=1326 audit(1761153504.109:3774): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:18:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560b, &(0x7f0000000000)) [ 1447.451160] audit: type=1326 audit(1761153504.109:3775): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:18:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) [ 1447.501324] audit: type=1326 audit(1761153504.118:3776): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:18:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560d, 0x0) [ 1447.550982] audit: type=1326 audit(1761153504.118:3777): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1447.584409] audit: type=1326 audit(1761153504.118:3778): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9427 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 17:18:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560c, &(0x7f0000000000)) 17:18:24 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:18:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000480), 0x2}, 0x0, 0x5, 0x0, 0x0, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000740)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000a00)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x7}, 0x0, 0x0, 0x1}, 0xffffff81) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0xfffffffc, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0xfffffffffffffde1}, 0x404c008) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet6(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f00000008c0)="071e9f7358ec922343d9786f3a5ffc4951d0a6a9f38dda8a9bae8f6f3734e082993d557367e24150405ca0111cc8069cb8ebd8c8564cc6aff4e3631e4eb8ebf43b0e3a61bb5878257df934ab1c2df75a49f4d39cf7b69b7185e6784ba4ef00"/104, 0x68) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0xffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pidfd_getfd(0xffffffffffffffff, r2, 0x0) readv(r0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x4, {}, 0x5, 0x3}, 0x5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x1, 0x0, r1, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x0) syz_open_procfs(0x0, &(0x7f00000006c0)='oom_score\x00') syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0xe00, 0x0) unshare(0x48020200) [ 1460.562328] kauditd_printk_skb: 31 callbacks suppressed [ 1460.562346] audit: type=1326 audit(1761153517.380:3810): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9466 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1460.575247] audit: type=1326 audit(1761153517.392:3811): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9467 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1460.583399] FAULT_INJECTION: forcing a failure. [ 1460.583399] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.585072] CPU: 1 PID: 9468 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1460.585997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1460.587087] Call Trace: [ 1460.587445] dump_stack+0x107/0x167 [ 1460.587926] should_fail.cold+0x5/0xa [ 1460.588424] ? audit_log_start.part.0+0x27e/0x730 [ 1460.589056] should_failslab+0x5/0x20 [ 1460.589552] kmem_cache_alloc+0x5b/0x310 [ 1460.590078] audit_log_start.part.0+0x27e/0x730 [ 1460.590678] ? audit_log_task_context+0x170/0x170 [ 1460.591299] ? audit_filter+0x5d6/0xb10 [ 1460.591823] ? __bpf_prog_run64+0xe0/0xe0 [ 1460.592360] ? audit_compare_dname_path+0x120/0x120 [ 1460.593000] ? find_held_lock+0x2c/0x110 [ 1460.593533] audit_log_start+0x5f/0x90 [ 1460.594035] audit_seccomp+0x5d/0x200 [ 1460.594535] ? lock_downgrade+0x6d0/0x6d0 [ 1460.595074] __seccomp_filter+0x669/0x1530 [ 1460.595632] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1460.596235] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1460.596861] ? wait_for_completion_io+0x270/0x270 [ 1460.597486] ? fput_many+0x2f/0x1a0 [ 1460.597958] ? ksys_write+0x1a9/0x260 [ 1460.598449] __secure_computing+0x191/0x2f0 [ 1460.599010] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1460.599715] do_syscall_64+0xf/0x40 [ 1460.600361] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1460.601245] RIP: 0033:0x7f8028ff5b19 [ 1460.601800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1460.604176] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1460.605159] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1460.606074] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb 17:18:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560d, &(0x7f0000000000)) 17:18:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, 0x0) 17:18:37 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:18:37 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 1) 17:18:37 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'macvlan0\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}, @mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}], @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004801}, 0x8041) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x10, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r4, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r5, 0x800, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, ["", ""]}, 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES16=r5, @ANYBLOB="000027bd7000fcdbdf25100000000c0099000004000017000000"], 0x20}}, 0x10) [ 1460.606996] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1460.608058] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1460.609233] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1460.609785] audit: type=1326 audit(1761153517.392:3812): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9467 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1460.610402] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 1460.615629] audit: out of memory in audit_log_start sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000c00)={0x8f8, r5, 0x400, 0x70bd26, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x6, 0x2e}}}}, [@NL80211_ATTR_TX_RATES={0x364, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x58, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xb, 0x1, [0xb, 0x12, 0x30, 0x3, 0x4, 0x12, 0xc]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x15, 0x2, [{0x7, 0x2}, {0x5}, {0x6, 0xa}, {0x2, 0x9}, {0x5, 0x4}, {0x1, 0x5}, {0x3, 0x2}, {0x1, 0x2}, {0x4, 0x4}, {0x0, 0x5}, {0x4, 0x5}, {0x3, 0x3}, {0x3, 0x2}, {0x7, 0x3}, {0x7, 0x8}, {0x5, 0x7}, {0x3, 0x19}]}, @NL80211_TXRATE_HT={0x27, 0x2, [{0x7, 0xa}, {0x5, 0x1}, {0x3, 0x6}, {0x0, 0x7}, {0x2}, {0x3, 0x6}, {0x1, 0x1}, {0x1, 0x2}, {0x0, 0x7}, {}, {0x6, 0x9}, {0x3, 0x1}, {0x7, 0x8}, {0x0, 0x8}, {0x4, 0x7}, {0x7, 0x3}, {0x3, 0x9}, {0x7, 0xa}, {0x2, 0x9}, {0x4, 0x2}, {0x3, 0x2}, {0x2}, {0x0, 0x1}, {0x6, 0x5}, {0x6}, {0x6}, {0x4, 0xa}, {0x6, 0x3}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0xa}, {0x4, 0x8}, {0x2, 0x3}, {0x5, 0x8}, {0x2, 0x4}]}]}, @NL80211_BAND_6GHZ={0x54, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x16, 0x1, [0x1b, 0x60, 0x2, 0x36, 0x12, 0x4, 0x1, 0x6ab4ef5449b90f43, 0x16, 0x4, 0x30, 0x60, 0x16, 0x2, 0x24, 0x5, 0x9, 0x5]}, @NL80211_TXRATE_LEGACY={0x1f, 0x1, [0x36, 0x4, 0x16, 0x1, 0x16, 0x48, 0x6c, 0x6, 0x6, 0x36, 0xc, 0x3, 0x18, 0x4, 0x1, 0x9, 0x1, 0x4, 0x6c, 0x24, 0x48, 0x4, 0x24, 0xb, 0x24, 0x2, 0x60]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x8c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x26, 0x2, [{}, {0x4, 0x9}, {0x7, 0x9}, {0x5, 0x4}, {0x5, 0x1}, {0x4, 0x4}, {0x1, 0x6}, {0x2, 0xa}, {0x5, 0x6}, {0x0, 0xa}, {0x0, 0x7}, {0x7, 0x9}, {0x1}, {0x6, 0x1}, {0x4, 0x1}, {0x7, 0x3}, {0x3, 0x2}, {0x5, 0x4}, {0x2, 0x8}, {0x3, 0x3}, {0x5, 0x4}, {0x4, 0x9}, {0x4, 0x5}, {0x5, 0x8}, {0x3, 0xa}, {0x1, 0x8}, {0x7, 0x3}, {0x3, 0x7}, {0x4, 0x1}, {0x7, 0x8}, {0x2}, {0x4, 0x3}, {0x5}, {0x4, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x5, 0x1000, 0x4, 0xd4, 0x0, 0xdc, 0x6]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xfff9, 0x7, 0x72f7, 0x8, 0x0, 0x4, 0x4, 0x3]}}, @NL80211_TXRATE_HT={0x16, 0x2, [{0x0, 0x2}, {0x1, 0x2}, {0x1, 0x5}, {0x6, 0x9}, {0x0, 0x1}, {0x5, 0x5}, {0x4, 0x6}, {0x2, 0x5}, {0x4, 0x8}, {0x7, 0x9}, {0x6, 0xe}, {0x2, 0x8}, {0x5, 0x3}, {0x1}, {0x6, 0x5}, {0x0, 0x5}, {0x7, 0x7}, {0x7, 0x4}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0x68, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0xb, 0xf, 0x9, 0x16, 0x16, 0x18, 0x24, 0x1]}, @NL80211_TXRATE_HT={0x50, 0x2, [{0x7, 0x4}, {0x0, 0xa}, {0x2, 0x7}, {0x2, 0x5}, {0x0, 0x1}, {0x2, 0x4}, {0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x7}, {0x7, 0x6}, {0x5}, {0x2, 0xa}, {0x3, 0x8}, {0x3, 0x6}, {0x3, 0x8}, {0x6, 0x8}, {0x4, 0x6}, {0x3, 0x3}, {0x1, 0x2}, {0x6, 0x1}, {0x0, 0x4}, {0x6, 0x5}, {0x2, 0xa}, {0x1, 0x3}, {0x7, 0x8}, {0x0, 0x4}, {0x6, 0x2}, {0x4, 0x1}, {0x2, 0x6}, {0x4, 0x4}, {}, {0x1, 0x7}, {0x0, 0xa}, {0x2, 0x5}, {0x0, 0x9}, {0x3, 0x8}, {0x0, 0x8}, {0x0, 0x2}, {0x6, 0x5}, {0x4, 0x1}, {0x3, 0xa}, {0x2, 0x2}, {0x0, 0x8}, {0x2, 0x9}, {0x0, 0x8}, {0x2, 0x4}, {0x6, 0x2}, {0x2}, {0x7, 0x3}, {0x1, 0x4}, {0x5, 0x7}, {0x1, 0x2}, {0x0, 0x1}, {0x1, 0x5}, {0x3, 0x2}, {0x6, 0x3}, {0x7, 0x5}, {0x2, 0x6}, {0x0, 0x1b}, {0x1, 0x5}, {0x6, 0x3}, {0x1, 0x9}, {0x2, 0x7}, {0x3, 0x2}, {0x7, 0x7}, {0x0, 0x6}, {0x4, 0x5}, {0x5, 0x9}, {0x3, 0x9}, {0x3, 0x4}, {0x3, 0x6}, {0x1}, {0x0, 0x7}, {0x2, 0x4}, {0x4, 0x7}]}]}, @NL80211_BAND_2GHZ={0x4c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x47, 0x2, [{0x3}, {0x2, 0x9}, {0x6, 0x1}, {0x2, 0x5}, {0x7, 0x9}, {0x4, 0x9}, {0x1, 0x3}, {0x0, 0x5}, {0x0, 0x3}, {0x1, 0x1}, {}, {0x5, 0x5}, {0x3, 0x7}, {0x0, 0x8}, {0x1, 0x4}, {0x1, 0x8}, {0x4, 0x7}, {0x7, 0x7}, {0x4, 0x6}, {0x6, 0x2}, {0x7}, {0x0, 0x6}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x0, 0x7}, {0x2, 0xa}, {0x1, 0x3}, {0x4, 0x4}, {0x6, 0x6}, {0x7, 0x8}, {0x6, 0x6}, {0x7, 0x3}, {0x7, 0x8}, {0x2, 0x8}, {0x7, 0x2}, {0x6, 0x1}, {0x6}, {0x7, 0x9}, {0x1, 0x2}, {0x1, 0x1}, {0x0, 0x3}, {}, {0x2, 0x2}, {0x6, 0x3}, {0x0, 0x7}, {0x3, 0xa}, {0x1, 0x3}, {0x2, 0x5}, {0x2, 0x7}, {0x4, 0x3}, {0x2, 0x8}, {0x7, 0x7}, {0x6, 0x8}, {0x7, 0x1}, {0x1, 0x8}, {0x6, 0x9}, {0x5, 0x2}, {0x1}, {0x4, 0x1}, {0x3, 0x9}, {0x0, 0x7}, {0x1, 0x7}, {0x0, 0x4}, {0x0, 0x2}, {0x5, 0x1}, {0x6, 0x5}]}]}, @NL80211_BAND_2GHZ={0xcc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x4e, 0x2, [{0x0, 0x2}, {0x4, 0x6}, {0x6, 0x2}, {0x4, 0x8}, {0x4, 0x4}, {0x3, 0x5}, {0x3, 0x7}, {0x2, 0x9}, {0x4}, {}, {0x0, 0x9}, {0x6, 0x9}, {0x6, 0xa}, {0x1, 0xa}, {0x3, 0x1}, {0x5, 0x4}, {0x6}, {0x3}, {0x2, 0x8}, {0x3, 0x2}, {0x7}, {0x6, 0x3}, {0x4, 0x3}, {0x5, 0x8}, {0x3, 0x5}, {0x2, 0x2}, {0x6, 0x2}, {0x2, 0x1}, {0x3, 0x9}, {0x0, 0x7}, {0x7, 0x3}, {0x7, 0xa}, {0x7, 0x1}, {0x5, 0xa}, {0x1, 0x5}, {0x5, 0x1}, {0x2, 0xa}, {0x5, 0x4}, {0x1, 0x3}, {0x5, 0x3}, {0x5, 0x4}, {0x3, 0x2}, {0x3, 0x3}, {0x0, 0x3}, {0x4, 0xa}, {0x5, 0x2}, {0x0, 0x4}, {0x3, 0x4}, {0x1, 0x3}, {0x5, 0x9}, {0x2, 0x5}, {0x1, 0x8}, {0x7}, {0x7, 0x7}, {0x1, 0xa}, {0x4, 0x6}, {0x4, 0x1a}, {0x6, 0xa}, {0x4}, {0x5, 0x4}, {0x1, 0x5}, {0x6, 0x9}, {0x0, 0x8}, {0x0, 0x1}, {0x4, 0x4}, {0x1, 0x7}, {0x2, 0x7}, {0x6, 0x4}, {0x5, 0x8}, {0x7, 0x5}, {0x7, 0x8}, {0x1}, {0x3, 0x7}, {0x0, 0x5}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x30, 0x2, [{0x1, 0x5}, {0x3, 0x9}, {0x7, 0x1}, {0x1, 0x6}, {0x7, 0x8}, {0x0, 0x9}, {0x1, 0x9}, {0x6, 0x8}, {0x7, 0x7}, {0x0, 0x4}, {0x6, 0x4}, {0x2, 0x8}, {0x2, 0x8}, {}, {0x3, 0x8}, {0x7, 0x4}, {0x1, 0x8}, {0x3, 0x8}, {0x0, 0x6}, {0x3, 0x3}, {0x2, 0x6}, {0x7, 0x3}, {0x5, 0x7}, {0x2, 0x9}, {0x1, 0x3}, {0x5, 0x2}, {0x4, 0x7}, {0x2, 0x9}, {0x5, 0x2}, {0x3, 0x4}, {0x6, 0x9}, {0x4}, {0x7, 0x8}, {0x4, 0x5}, {0x5, 0x1}, {0x6, 0x4}, {0x5}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x8}, {0x5}, {0x6}, {0x5, 0x6}, {0x1, 0x8}]}, @NL80211_TXRATE_HT={0x25, 0x2, [{0x3, 0x1}, {0x2, 0x7}, {0x1, 0xa}, {0x7, 0x9}, {0x5, 0x8}, {0x4, 0x1}, {0x7, 0x2}, {0x1, 0x9}, {0x4, 0x3}, {0x6, 0x4}, {0x6, 0x7}, {0x2, 0xa}, {0x4, 0x3}, {0x0, 0x2}, {0x5, 0x7}, {0x6, 0x6}, {0x0, 0x7}, {0x3}, {0x1, 0x1}, {0x2, 0x5}, {0x2, 0x8}, {0x5, 0x3}, {0x1, 0x9}, {0x0, 0xa}, {0x7, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x2}, {0x3, 0x1}, {0x4, 0x6}, {0x1, 0xa}, {0x4, 0x6}, {0x6}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0xa8, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0xc000, 0xa0, 0x1, 0x4, 0xf4b, 0x3ff, 0x7ff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x80, 0x5539, 0xffff, 0x4, 0x0, 0x5, 0x101, 0xe8c]}}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x48, 0x9, 0x21, 0xb, 0x1b, 0x1b, 0x6c, 0x5, 0x1, 0x5, 0xb, 0x36, 0x18, 0x660f3a7cd1767ad3, 0x60, 0x24, 0x5, 0x30, 0xb, 0x2, 0x1, 0x1, 0xb, 0x6c, 0x6, 0x2, 0x18, 0x60, 0x5, 0x5, 0x24, 0x18]}, @NL80211_TXRATE_HT={0x4}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff, 0x100, 0x5, 0xff, 0x2, 0x5, 0xff, 0x4]}}, @NL80211_TXRATE_HT={0x19, 0x2, [{0x4, 0x3}, {0x5, 0x9}, {0x4, 0x1}, {0x2, 0x8}, {0x1, 0x7}, {0x0, 0x8}, {0x2, 0x6}, {0x0, 0x2}, {0x7, 0x5}, {0x0, 0x7}, {0x1, 0x4}, {0x7, 0x8}, {0x0, 0x1}, {0x6, 0x9}, {0x1}, {0x6, 0xa}, {0x2, 0x1}, {0x4, 0x8}, {0x0, 0x9}, {0x7, 0x2}, {0x1, 0xa}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x8, 0x5, 0x2, 0x7, 0x2, 0x9, 0x7]}}]}]}, @NL80211_ATTR_TX_RATES={0xec, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1f, 0xdc0, 0x6, 0x2, 0x3, 0x0, 0x0, 0x8]}}]}, @NL80211_BAND_2GHZ={0x4}, @NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x10, 0x1, [0x6c, 0x3, 0x0, 0x36, 0x18, 0x30, 0x6c, 0x3, 0x12, 0xc, 0x60, 0x4]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x60, 0x0, 0x16, 0x1b, 0x36, 0x36, 0x48, 0x2, 0x5, 0x5, 0x6c, 0x24, 0x6, 0x24, 0xb]}]}, @NL80211_BAND_2GHZ={0x88, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x9, 0x6, 0x7, 0x5, 0x4, 0x20, 0xa955, 0x7]}}, @NL80211_TXRATE_HT={0x3f, 0x2, [{0x4, 0x3}, {0x6, 0x9}, {0x7, 0x2}, {0x0, 0x6}, {0x0, 0x2}, {0x2, 0x3}, {0x0, 0x9}, {0x6, 0x7}, {0x4}, {0x0, 0x6}, {0x3, 0x7}, {0x6, 0x8}, {0x6}, {0x6, 0xa}, {0x0, 0x6}, {0x0, 0x6}, {0x1, 0x9}, {0x6, 0x6}, {0x6, 0xa}, {0x2, 0x5}, {0x1, 0x5}, {0x4, 0x5}, {0x5, 0x4}, {0x5, 0x6}, {0x7, 0x7}, {0x5, 0xa}, {0x7, 0x5}, {0x5, 0xa}, {0x2, 0x7}, {0x7, 0x2}, {0x4, 0x4}, {0x1, 0x9}, {0x1, 0x3}, {0x2, 0x9}, {0x6, 0xa}, {0x2}, {0x5, 0x1}, {0x6, 0x7}, {0x2, 0x7}, {0x0, 0x8}, {0x2, 0x3}, {0x7, 0x2}, {0x3, 0x3}, {0x7, 0x6}, {0x6, 0x3}, {0x5, 0xa}, {0x4, 0xa}, {0x6, 0x7}, {0x0, 0x1}, {0x4, 0x4}, {0x1, 0x2}, {0x2, 0x2}, {0x7, 0x9}, {0x4, 0x8}, {0x2, 0x6}, {0x5, 0x1}, {0x1, 0x9}, {0x2, 0x4}, {0x5, 0x9}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xb0, 0x7fff, 0x1, 0x1, 0x200, 0x8, 0x3, 0x8]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x12b6, 0x9, 0x7f, 0xce, 0x0, 0x7, 0x8000]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}]}, @NL80211_ATTR_TX_RATES={0x488, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x13c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x800, 0xffff, 0x53, 0x9, 0x20, 0x6, 0xdc0, 0xfffa]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x100, 0x5, 0x4, 0x40, 0x4, 0x401, 0xfffc, 0x7fff]}}, @NL80211_TXRATE_HT={0x4e, 0x2, [{0x2, 0x8}, {0x1, 0x12}, {0x6}, {0x2, 0x2}, {0x0, 0x9}, {0x0, 0x8}, {0x1, 0x7}, {0x0, 0x4}, {0x0, 0x2}, {0x5, 0x5}, {0x1, 0x3}, {0x7, 0x9}, {0x7, 0x7}, {0x5, 0x8}, {0x0, 0x6}, {0x3, 0x7}, {0x0, 0x7}, {0x6}, {0x0, 0xa}, {0x0, 0x9}, {0x3, 0x6}, {0x7, 0xa}, {0x3, 0x4}, {0x0, 0x3}, {0x0, 0xa}, {0x7, 0x3}, {0x2}, {0x0, 0xa}, {0x7, 0x4}, {0x2, 0x6}, {0x6, 0x1}, {0x7, 0x3}, {}, {0x4, 0xa}, {0x4}, {0x4, 0x5}, {0x2, 0x1}, {0x7, 0x7}, {0x2, 0x9}, {0x1, 0xa}, {0x5, 0x1}, {0x0, 0x3}, {0x5, 0x3}, {0x0, 0x3}, {0x7, 0x6}, {0x7, 0x7}, {0x3, 0x8}, {0x6, 0x3}, {0x7, 0x8}, {0x0, 0x8}, {0x0, 0x7}, {0x6, 0x6}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x6}, {0x7, 0x8}, {0x5, 0x5}, {0x5, 0x3}, {0x1, 0x1}, {0x7, 0x9}, {0x1, 0x1}, {0x5, 0x1}, {0x7, 0x2}, {0x4, 0x3}, {0x2, 0x9}, {0x1, 0x7}, {0x0, 0x2}, {0x0, 0x5}, {0x6, 0x7}, {}, {0x2, 0x6}, {0x1, 0x5}, {0x7, 0x7}, {0x3, 0x9}]}, @NL80211_TXRATE_HT={0x4e, 0x2, [{0x6, 0x9}, {0x2, 0xa}, {0x0, 0x1}, {0x3, 0x7}, {0x0, 0x5}, {0x0, 0xa}, {0x7, 0x3}, {0x7, 0x7}, {0x5, 0x8}, {0x3}, {0x2, 0x2}, {0x7, 0xa}, {0x7}, {0x7, 0x6}, {0x5, 0x7}, {0x4, 0x8}, {0x7, 0x1}, {0x7, 0xa}, {0x6, 0x1}, {0x7, 0xa}, {0x1, 0x2}, {0x5, 0x3}, {0x3, 0x7}, {0x1, 0xa}, {0x2, 0xa}, {0x3, 0x9}, {0x5, 0x9}, {0x5, 0x6}, {0x1, 0x4}, {0x2, 0xa}, {0x0, 0x5}, {0x7, 0x1}, {0x3, 0x4}, {0x1, 0x1}, {0x7, 0x6}, {0x1, 0x4}, {0x5, 0x7}, {0x4, 0x4}, {0x6, 0xa}, {0x7, 0x5}, {0x0, 0xa}, {0x0, 0xa}, {0x5, 0x8}, {0x4}, {0x5, 0x6}, {0x0, 0x3}, {0x7, 0x7}, {0x7, 0x9}, {0x6, 0x4}, {0x7, 0x5}, {0x0, 0x6}, {0x3, 0x5}, {0x4}, {0x5, 0x9}, {0x3, 0xa}, {0x4, 0x8}, {0x0, 0x6}, {0x1, 0x1}, {0x7, 0x6}, {0x4}, {0x2, 0x7}, {0x1, 0x4}, {}, {0x6}, {0x4, 0x1}, {0x3, 0xa}, {0x7, 0x7}, {0x4, 0x8}, {0x0, 0x9}, {0x0, 0x7}, {0x6, 0x5}, {0x7, 0x1}, {0x6, 0x3}, {0x2, 0xa}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x40, 0xc1, 0x101, 0x6, 0xff, 0xff, 0x4, 0x7]}}, @NL80211_TXRATE_HT={0x4b, 0x2, [{0x4, 0x1}, {0x0, 0x7}, {0x2, 0x3}, {0x6}, {0x6, 0x6}, {0x6, 0x6}, {0x6, 0x3}, {0x4}, {0x7, 0xa}, {0x6, 0x5}, {0x2, 0x6}, {0x1, 0x1}, {0x4, 0xa}, {0x5, 0x7}, {0x2, 0x3}, {0x3, 0x2}, {0x7, 0x9}, {0x0, 0x6}, {0x7, 0x6}, {0x1, 0x7}, {0x1, 0x1}, {0x3, 0x8}, {0x5, 0x7}, {0x0, 0x6}, {0x0, 0x2}, {0x3}, {0x7, 0x9}, {0x1}, {0x0, 0x4}, {0x6, 0x9}, {0x5, 0x3}, {0x1, 0x3}, {0x0, 0x1}, {0x0, 0x6}, {0x0, 0x3}, {0x1, 0x3}, {0x3, 0x4}, {0x7, 0x7}, {0x3, 0x2}, {0x4, 0xa}, {0x3, 0x5}, {0x1}, {0x3, 0x6}, {0x5, 0x5}, {0x0, 0x2}, {0x6, 0x3}, {0x5, 0x7}, {0x3, 0x5}, {0x4, 0x6}, {0x6, 0x7}, {0x5}, {0x6, 0x4}, {0x7, 0x7}, {0x7, 0x8}, {0x6, 0x2}, {0x2, 0xa}, {0x3, 0x8}, {}, {0x0, 0x1}, {0x0, 0x9}, {0x1, 0x3}, {0x7, 0x1}, {0x3, 0x6}, {0x1, 0x3}, {0x1, 0x5}, {0x4, 0x3}, {0x7, 0x2}, {0x2}, {0x5, 0x3}, {0x3, 0x8}, {0x1, 0x6}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0x78, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x51, 0x2, [{0x5}, {0x4, 0x7}, {0x1, 0x1}, {0x1, 0x9}, {}, {0x2, 0x1}, {0x0, 0x2}, {0x1, 0x7}, {0x6, 0x3}, {0x6, 0x6}, {0x0, 0xa}, {0x1, 0x4}, {0x7, 0x2}, {0x1, 0x2}, {0x4, 0x9}, {0x4, 0x5}, {0x2, 0x2}, {0x5, 0x7}, {0x6, 0xa}, {0x1, 0x5}, {0x2, 0x8}, {0x4, 0x7}, {0x7, 0xa}, {0x2, 0x9}, {0x4, 0x2}, {0x5, 0x6}, {0x0, 0x4}, {0x0, 0x2}, {0x1, 0x3}, {0x0, 0xa}, {0x6, 0x1}, {0x4, 0x9}, {0x7, 0x4}, {0x0, 0x1}, {0x3, 0x7}, {0x0, 0x3}, {0x1, 0xa}, {0x6, 0x9}, {0x5, 0x6}, {0x6, 0x1}, {0x5}, {0x1, 0x3}, {0x3}, {0x3, 0x8}, {0x1, 0x6}, {0x3, 0x5}, {0x2, 0x9}, {0x1, 0x7}, {0x4, 0x8}, {0x2, 0x7}, {0x5, 0x7}, {0x2, 0x8}, {0x6, 0x9}, {0x6, 0x5}, {0x5, 0x4}, {0x3, 0xa}, {0x4, 0x4}, {0x2, 0x4}, {0x4, 0x8}, {0x2}, {0x1, 0x7}, {0x2}, {0x1, 0x1}, {0x5, 0x9}, {0x7, 0x8}, {0x4, 0x1}, {0x2, 0x5}, {0x4, 0x4}, {0x7, 0x1}, {0x5, 0x3}, {0x4, 0x4}, {0x6, 0x2}, {0x6, 0x5}, {0x5, 0x5}, {0x0, 0x4}, {0x1, 0x2}, {0x7, 0x8}]}, @NL80211_TXRATE_HT={0x7, 0x2, [{0x0, 0x7}, {0x7, 0x2}, {0x2, 0x1}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0xa4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xb, 0x1, [0x622a4b790bc82601, 0x24, 0x60, 0x1b, 0x6, 0x6c, 0x18]}, @NL80211_TXRATE_HT={0x24, 0x2, [{0x4, 0x7}, {}, {0x1, 0x5}, {0x1, 0x8}, {0x3, 0x2}, {0x0, 0x7}, {}, {0x0, 0x9}, {0x3, 0x8}, {0x6, 0x4}, {0x7, 0x7}, {0x7, 0x9}, {0x0, 0x4}, {0x3, 0x7}, {0x4, 0x6}, {0x2, 0x2}, {0x3, 0x7}, {0x1, 0xa}, {0x5, 0x5}, {0x0, 0xa}, {0x4, 0x6}, {0x4, 0x6}, {0x3, 0x1}, {0x7, 0x4}, {0x5, 0x7}, {0x2}, {0x6}, {0x2, 0x7}, {0x6}, {0x3, 0x6}, {0x3, 0xa}, {0x7, 0xa}]}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x6, 0x2, 0x6, 0x1, 0x16, 0x12, 0x12, 0x12, 0xb, 0x36, 0x48, 0xe7, 0x9, 0x5, 0x6, 0x2, 0x12, 0x16, 0xb, 0x60, 0x24, 0x6c, 0x4, 0x0, 0x16, 0x2, 0x6c, 0x5, 0x6, 0x1, 0xb, 0xb]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xffff, 0x6cc5, 0x8, 0xc82d, 0xeac, 0x0, 0x200, 0x1ff]}}, @NL80211_TXRATE_HT={0x30, 0x2, [{0x1}, {0x1, 0xa}, {0x6, 0xa}, {0x2, 0x6}, {0x0, 0x1}, {0x0, 0x8}, {0x6, 0xa}, {0x3, 0x5}, {0x5, 0x9}, {0x7, 0x7}, {0x7, 0x8}, {0x2, 0xa}, {0x3, 0x9}, {0x0, 0x2}, {0x6, 0xa}, {0x6, 0x5}, {0x5, 0x7}, {0x5, 0x2}, {0x2, 0x1}, {0x2, 0xa}, {0x5, 0x4}, {0x1, 0x9}, {0x1, 0x8}, {0x2, 0x8}, {0x7, 0x1}, {}, {0x5, 0x1}, {0x0, 0x6}, {0x7, 0x7}, {0x2, 0x1}, {0x6, 0x3}, {0x1, 0xa}, {0x0, 0x1}, {0x4, 0x2}, {0x3, 0x4}, {0x6, 0x7}, {0x0, 0x4}, {0x6, 0x5}, {0x4, 0xa}, {0x1, 0x5}, {0x0, 0x6}, {0x1, 0x3}, {0x4, 0x1}, {0x1, 0xa}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x2, 0x4, 0x9e6, 0xffff, 0xd9, 0xbdc, 0xffff]}}]}, @NL80211_BAND_2GHZ={0x64, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x3f, 0x0, 0x1000, 0xfff, 0x5, 0x400, 0x3, 0x1ff]}}, @NL80211_TXRATE_LEGACY={0xb, 0x1, [0x24, 0x48, 0x60, 0x16, 0x1, 0x3, 0x30]}, @NL80211_TXRATE_HT={0x23, 0x2, [{}, {0x1, 0x9}, {0x6, 0x6}, {0x2, 0x1}, {0x2, 0x8}, {0x1, 0x6}, {0x6, 0x1}, {0x3}, {0x6, 0x8}, {0x7, 0x4}, {0x4, 0x5}, {0x5, 0xa}, {0x2}, {0x1, 0x1}, {0x1, 0x8}, {0x0, 0x2}, {0x7, 0x1}, {0x4, 0x4}, {0x5, 0x1}, {0x1, 0x6}, {0x4, 0x2}, {0x0, 0xa}, {0x1, 0x4}, {0x4, 0x1}, {0x2, 0x6}, {}, {0x2, 0x6}, {0x1}, {0x1, 0xa}, {0x3}, {0x6, 0x9}]}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x30, 0x1b, 0x24, 0x16, 0x12, 0x30, 0x48, 0x9, 0x3, 0x36, 0x16, 0x24, 0xc, 0xb, 0x12]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_2GHZ={0x94, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0xf, 0x1, [0x9, 0x1b, 0x12, 0xb, 0xc, 0x3, 0x12, 0x60, 0x9, 0xb, 0xc]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0xdcd, 0x7, 0x101, 0x7, 0x4, 0x8, 0x400]}}, @NL80211_TXRATE_LEGACY={0x20, 0x1, [0x30, 0x3, 0x16, 0x4, 0x36, 0x3, 0x14, 0x6, 0xeeedf2109243bc17, 0x3, 0x12, 0x3, 0x6, 0x12, 0x3, 0x36, 0x2, 0xb, 0x77, 0x1, 0x18, 0x48, 0x4, 0x18, 0x24, 0x3, 0x16, 0x60]}, @NL80211_TXRATE_HT={0x30, 0x2, [{0x7, 0x6}, {0x1, 0xa}, {0x4, 0x7}, {0x4, 0x7}, {0x4, 0x5}, {0x6, 0x9}, {0x6, 0x1}, {0x1, 0x9}, {0x2, 0x7}, {0x5, 0x2}, {0x1, 0x1}, {0x2, 0x7}, {0x6, 0x9}, {0x5, 0x7}, {0x1, 0x4}, {0x1, 0x2}, {0x5, 0x1}, {0x4, 0x4}, {0x5, 0x9}, {0x4, 0x9}, {0x4, 0x7}, {0x7, 0xa}, {0x6, 0x9}, {0x2, 0x6}, {0x5, 0x1}, {0x2, 0x6}, {0x4, 0x9}, {0x7, 0xa}, {0x3, 0x3}, {0x0, 0x5}, {0x4, 0x9}, {0x6, 0x1}, {0x0, 0x9}, {0x4, 0xa}, {0x2, 0xa}, {0x1}, {0x6, 0x2}, {0x3, 0xa}, {0x2}, {0x0, 0x9}, {0x4, 0x8}, {0x0, 0x7}, {0x1, 0x6}, {}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x2, 0x1, 0x7, 0xcd0c, 0x304, 0x20, 0x80]}}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x18, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x2, 0x6, 0xfff, 0x4, 0xff, 0xd989, 0x9]}}]}, @NL80211_BAND_2GHZ={0x104, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x9, 0x2, 0x2ed, 0x91a1, 0x7, 0x8, 0x6045]}}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_HT={0x4c, 0x2, [{0x0, 0x8}, {0x2, 0x9}, {0x4, 0x1}, {0x7, 0x1}, {0x3, 0x3}, {0x0, 0x3}, {0x3}, {0x2, 0x8}, {0x1, 0xa}, {0x0, 0x9}, {0x1, 0x9}, {0x0, 0x6}, {0x0, 0x4}, {0x4, 0x5}, {0x3, 0x2}, {0x1, 0x1}, {0x5}, {0x2, 0x7}, {0x1, 0x4}, {0x4, 0x4}, {0x0, 0x4}, {0x0, 0x9}, {0x1}, {0x2, 0x5}, {0x0, 0x6}, {0x3, 0x8}, {0x1, 0x5}, {0x3, 0x1}, {0x0, 0x9}, {0x1, 0x4}, {0x6, 0x6}, {0x5, 0x2}, {0x1, 0x8}, {0x6, 0x7}, {0x0, 0xa}, {0x3, 0x8}, {0x3}, {0x4, 0x5}, {0x4, 0x8}, {0x5, 0x1}, {0x0, 0x19}, {0x6, 0x2}, {0x7, 0x8}, {0x2, 0x8}, {0x4, 0x1}, {0x4, 0x9}, {0x4, 0x1}, {0x0, 0x5}, {0x2, 0x9}, {0x0, 0x8}, {0x7}, {0x0, 0x2}, {0x5, 0x4}, {0x0, 0x8}, {0x6, 0x3}, {0x3, 0x9}, {0x1, 0x8}, {0x4, 0x6}, {0x1, 0x6}, {0x6, 0x4}, {0x4, 0x2}, {0x1, 0x8}, {0x2, 0x7}, {0x5, 0x7}, {0x0, 0x6}, {0x1, 0x1}, {0x3, 0x3}, {0x0, 0x2}, {0x0, 0x8}, {0x6, 0x9}, {0x2, 0xa}, {0x6, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x101, 0x709a, 0x6, 0xe51b, 0x4, 0x6, 0x1, 0x49]}}, @NL80211_TXRATE_HT={0x4f, 0x2, [{0x5, 0x8}, {0x4, 0x9}, {0x7, 0x3}, {0x2}, {0x0, 0x9}, {0x6, 0x2}, {0x7, 0x1}, {0x0, 0x7}, {0x0, 0x9}, {0x0, 0x4}, {0x0, 0x8}, {0x6, 0x5}, {0x2, 0x6}, {0x0, 0x6}, {0x0, 0x6}, {0x4, 0x9}, {0x5, 0x8}, {0x4, 0x8}, {0x7}, {0x7, 0x5}, {0x1, 0xa}, {0x6, 0x6}, {0x2, 0xa}, {0x4, 0x6}, {0x3, 0xa}, {0x7, 0x2}, {0x7, 0x3}, {0x1}, {0x7, 0x6}, {0x1}, {0x2, 0xa}, {0x7, 0x1}, {0x0, 0x6}, {0x0, 0x2}, {0x7, 0xd}, {0x7, 0x3}, {0x0, 0x7}, {0x2, 0x6}, {0x0, 0x5}, {}, {0x5, 0x5}, {0x3, 0x9}, {0x0, 0x1}, {0x6, 0x2}, {0x6, 0x3}, {0x1, 0x8}, {0x7}, {0x2, 0x8}, {0x2}, {0x4, 0x1}, {0x4, 0x7}, {0x7, 0x2}, {0x4, 0x3}, {0x1, 0x2}, {0x1, 0x3}, {0x1, 0x3}, {0x0, 0x5}, {0x3, 0x5}, {0x2, 0x6}, {0x7, 0x7}, {0x4, 0x6}, {0x7, 0x2}, {0x6, 0x5}, {0x2, 0xa}, {0x5, 0x3}, {0x4, 0x1}, {}, {0x6, 0x1}, {0x1, 0x8}, {0x5, 0x1}, {0x0, 0xa}, {0x4, 0xa}, {0x4, 0xa}, {0x4, 0x2}, {0x2, 0x7}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x800, 0x7, 0x0, 0x1, 0x0, 0x4, 0x9]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x20, 0x401, 0x6, 0x7f, 0x6cf7, 0x4, 0x3, 0x1]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5}]}]}]}, 0x8f8}}, 0x4000) sendmsg$nl_generic(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000003840)=ANY=[@ANYBLOB="140000001d0000000006000000"], 0x14}}, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) sendmsg$TIPC_NL_KEY_SET(r6, &(0x7f0000000440)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000600)={0x218, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x30, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x32a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @mcast2, 0xc}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}}}}]}, @TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x21}]}]}, @TIPC_NLA_BEARER={0x74, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg2\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc886}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}]}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x28, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'netdevsim0\x00'}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x68}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8c6a}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c810) 17:18:37 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1460.638701] audit: type=1326 audit(1761153517.393:3813): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9467 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1460.670117] audit: type=1326 audit(1761153517.394:3814): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9467 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1460.700389] audit: type=1326 audit(1761153517.394:3815): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9467 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:18:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000004f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60}, {&(0x7f0000010100)='RRaA\x00'/32, 0x20, 0x800}, {&(0x7f0000010200)="00000000727241610100000007000000000000000000000000000000000055aa", 0x20, 0x9e0}, {&(0x7f0000010300)="601c6d6b646f736616e0ca00088020000400000004f80000200040000300000000000000010000000000000002000000010006000000000000000000000000008000"/96, 0x60, 0x3000}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10000}, {&(0x7f0000010500)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x10800}, {&(0x7f0000010600)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x11000}, {&(0x7f0000010700)="f8ffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0fffffff0f", 0x20, 0x11800}, {&(0x7f0000010800)="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", 0x120, 0x12000}, {&(0x7f0000010a00)="2e20202020202020202020100061ec70325132510000ec7032510300000000002e2e202020202020202020100061ec70325132510000ec70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200061ec70325132510000ec70325104001a040000", 0x80, 0x52000}, {&(0x7f0000010b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x92000}, {&(0x7f0000011000)='syzkallers\x00'/32, 0x20, 0xd2000}, {&(0x7f0000011100)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x152000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0057015f8c27b5de2ce2c89bfe5099b12472ff1d0d97caf26bbe9c61b094505b3e119dc0d237d84c74823bef0153a57bde7c7bc3e30a26e37f1bb4059081e40c7b74bffd1e7e6174f88e9c5664d7005ec858ff866300c39f889278fc9f31366547a1bff5ae1c9837c5e9664e248eea03d273c79bf9cdf086a3828f153a8c3a5f0040e9eeeba3bf9145b0b8f3e7a3f5d6ac01cbc37ccc14450ac767fedc84c11806ca48b46bfd52f0f9d5d061ac8ef5c4dde5828c9317c1c73aac9d9dd368d40138daee7238e404351bb5ec32a1132c543dc3a77c27d3d663e67633"]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 17:18:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560e, 0x0) 17:18:37 executing program 1: semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r0 = semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(r0, 0x0, 0xb) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0xf747, 0x8]) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000100)=[{0x3, 0x52e5, 0x1000}, {0x4, 0x40, 0x1800}, {0x4, 0xffd1}], 0x3, &(0x7f0000000180)={r1, r2+60000000}) r3 = semget$private(0x0, 0x1, 0xd2) semtimedop(r3, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$SEM_STAT_ANY(r3, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget$private(0x0, 0x6, 0x0) semop(r4, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}, {0x2, 0x8, 0x800}, {0x4}], 0x4) semtimedop(0x0, &(0x7f00000001c0)=[{0x2, 0xffff}, {0x1, 0x5, 0x1000}], 0x2, &(0x7f0000000200)={0x77359400}) semtimedop(0x0, &(0x7f0000000140)=[{}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$SEM_INFO(r4, 0x5, 0x13, &(0x7f0000000080)=""/101) unshare(0x48020200) 17:18:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x560f, 0x0) [ 1460.722712] audit: type=1326 audit(1761153517.401:3816): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9467 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 17:18:37 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560e, &(0x7f0000000000)) [ 1460.726869] audit: type=1326 audit(1761153517.401:3817): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9467 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8028fa85ff code=0x7ffc0000 17:18:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) 17:18:37 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000200)=0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000002100)="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", 0x8a1}], 0x1}}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000e80)="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", 0xdf8}], 0x1}}], 0x2, 0x48044) 17:18:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x560f, &(0x7f0000000000)) 17:18:54 executing program 6: mq_open(&(0x7f0000000140)=')*\x00', 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) syz_mount_image$vfat(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x3, 0x0, &(0x7f0000000900), 0x800000, &(0x7f0000000180)=ANY=[@ANYBLOB="c4459430eadd235228aafb35ab6cd89a68f2578c7064df500b2f7bb24c3dfe7e758bf7d88f132ccbedaec66b75ff50a28acb5054f43ab44274661e82451ec94a4ede9225492a8136a11b88de46909764e580bda7c143e8884c020868b801680743ec2557ac4b18b113ac0ae4c035cd8053277adbfcb7e02ef40d3fa26dcf44ab24574ad956c4aa24f64df283249f4f6ad5867eb498da73459253d05b3fb2368fa82fc2246e563fbba2999d2694c7d3ddc14680985bb9e916d208489828b378f150c6b815f8c3e5e4dc"]) 17:18:54 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:18:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40049409, 0x0) 17:18:54 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 2) 17:18:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) 17:18:54 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:18:54 executing program 1: semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r0 = semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(r0, 0x0, 0xb) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0xf747, 0x8]) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000100)=[{0x3, 0x52e5, 0x1000}, {0x4, 0x40, 0x1800}, {0x4, 0xffd1}], 0x3, &(0x7f0000000180)={r1, r2+60000000}) r3 = semget$private(0x0, 0x1, 0xd2) semtimedop(r3, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$SEM_STAT_ANY(r3, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget$private(0x0, 0x6, 0x0) semop(r4, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}, {0x2, 0x8, 0x800}, {0x4}], 0x4) semtimedop(0x0, &(0x7f00000001c0)=[{0x2, 0xffff}, {0x1, 0x5, 0x1000}], 0x2, &(0x7f0000000200)={0x77359400}) semtimedop(0x0, &(0x7f0000000140)=[{}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$SEM_INFO(r4, 0x5, 0x13, &(0x7f0000000080)=""/101) unshare(0x48020200) [ 1477.250307] kauditd_printk_skb: 39 callbacks suppressed [ 1477.250325] audit: type=1326 audit(1761153534.068:3857): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9515 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1477.257349] audit: type=1326 audit(1761153534.068:3858): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9515 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1477.260147] FAULT_INJECTION: forcing a failure. [ 1477.260147] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.264695] CPU: 0 PID: 9517 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1477.266174] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1477.267975] Call Trace: [ 1477.268551] dump_stack+0x107/0x167 [ 1477.269340] should_fail.cold+0x5/0xa [ 1477.270165] ? create_object.isra.0+0x3a/0xa30 [ 1477.271162] should_failslab+0x5/0x20 [ 1477.271989] kmem_cache_alloc+0x5b/0x310 [ 1477.272874] ? auditd_test_task+0x11e/0x300 [ 1477.273809] create_object.isra.0+0x3a/0xa30 [ 1477.274754] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1477.275869] kmem_cache_alloc+0x159/0x310 [ 1477.276767] audit_log_start.part.0+0x27e/0x730 [ 1477.277772] ? audit_log_task_context+0x170/0x170 [ 1477.278807] ? audit_filter+0x5d6/0xb10 [ 1477.279684] ? __bpf_prog_run64+0xe0/0xe0 [ 1477.280577] ? audit_compare_dname_path+0x120/0x120 [ 1477.281657] ? find_held_lock+0x2c/0x110 [ 1477.282541] audit_log_start+0x5f/0x90 [ 1477.283379] audit_seccomp+0x5d/0x200 [ 1477.284211] ? lock_downgrade+0x6d0/0x6d0 [ 1477.285115] __seccomp_filter+0x669/0x1530 [ 1477.286037] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1477.286492] audit: type=1326 audit(1761153534.071:3859): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9515 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1477.287045] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1477.292961] ? wait_for_completion_io+0x270/0x270 [ 1477.293995] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1477.294967] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1477.296129] ? ksys_write+0x1a9/0x260 [ 1477.296946] __secure_computing+0x191/0x2f0 [ 1477.297872] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1477.299012] do_syscall_64+0xf/0x40 [ 1477.299800] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1477.300894] RIP: 0033:0x7f8028ff5b19 [ 1477.301690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1477.305633] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1477.307251] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1477.308777] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1477.309518] audit: type=1326 audit(1761153534.076:3860): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9515 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 [ 1477.310290] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1477.310307] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1477.317779] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:18:54 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 1477.355927] audit: type=1326 audit(1761153534.076:3861): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9515 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8028fa85ff code=0x7ffc0000 17:18:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40086602, 0x0) [ 1477.391805] audit: type=1326 audit(1761153534.138:3862): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9514 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40049409, &(0x7f0000000000)) [ 1477.423360] audit: type=1326 audit(1761153534.139:3863): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9514 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) [ 1477.445038] audit: type=1326 audit(1761153534.140:3864): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9514 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:54 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x9) r2 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x44020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x6}) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, r3, 0x7, 0xffffffffffffffff, 0x2) r4 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x5, 0xfa, 0x9, 0x8, 0x0, 0x2, 0x40000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x10084, 0x2, 0x3f, 0x3, 0xfffffffffffffff7, 0x101, 0xe4, 0x0, 0x8, 0x0, 0x8004}, r3, 0x10, r2, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r6, 0x107, 0x6, &(0x7f00000002c0)=""/159, &(0x7f0000000380)=0x9f) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30}, {0x6}]}, 0x10) tgkill(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) clone3(&(0x7f0000000380)={0x82140080, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000340)=[0x0, 0x0], 0x2}, 0x58) [ 1477.486879] audit: type=1326 audit(1761153534.141:3865): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9514 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1477.523316] audit: type=1326 audit(1761153534.141:3866): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9514 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:18:54 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 3) 17:18:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x40087602, 0x0) 17:18:54 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:18:54 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40086602, &(0x7f0000000000)) [ 1477.742912] FAULT_INJECTION: forcing a failure. [ 1477.742912] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.746294] CPU: 0 PID: 9543 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1477.747752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1477.749470] Call Trace: [ 1477.750112] dump_stack+0x107/0x167 [ 1477.750869] should_fail.cold+0x5/0xa [ 1477.751713] ? __alloc_skb+0x6d/0x5b0 [ 1477.752512] should_failslab+0x5/0x20 [ 1477.753306] kmem_cache_alloc_node+0x55/0x330 [ 1477.754228] ? trace_hardirqs_on+0x5b/0x180 [ 1477.755128] __alloc_skb+0x6d/0x5b0 [ 1477.755916] audit_log_start.part.0+0x2a3/0x730 [ 1477.756876] ? audit_log_task_context+0x170/0x170 [ 1477.757909] ? audit_filter+0x5d6/0xb10 [ 1477.758981] ? __bpf_prog_run64+0xe0/0xe0 [ 1477.759911] ? audit_compare_dname_path+0x120/0x120 [ 1477.761205] ? find_held_lock+0x2c/0x110 [ 1477.762160] audit_log_start+0x5f/0x90 [ 1477.763174] audit_seccomp+0x5d/0x200 [ 1477.764020] ? lock_downgrade+0x6d0/0x6d0 [ 1477.765087] __seccomp_filter+0x669/0x1530 [ 1477.766086] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1477.767231] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1477.768513] ? wait_for_completion_io+0x270/0x270 [ 1477.769583] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1477.770768] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1477.772032] ? ksys_write+0x1a9/0x260 [ 1477.773034] __secure_computing+0x191/0x2f0 [ 1477.773984] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1477.775383] do_syscall_64+0xf/0x40 [ 1477.776197] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1477.777556] RIP: 0033:0x7f8028ff5b19 [ 1477.778368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1477.783278] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1477.784980] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1477.786542] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1477.788097] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1477.789636] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1477.791179] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:18:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4020940d, 0x0) 17:19:11 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1494.666677] kauditd_printk_skb: 57 callbacks suppressed [ 1494.666698] audit: type=1326 audit(1761153551.484:3922): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9559 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1494.684260] FAULT_INJECTION: forcing a failure. [ 1494.684260] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.685861] CPU: 1 PID: 9562 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1494.686701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1494.686738] audit: type=1326 audit(1761153551.485:3923): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9559 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1494.687666] Call Trace: [ 1494.687684] dump_stack+0x107/0x167 [ 1494.687696] should_fail.cold+0x5/0xa [ 1494.687710] ? create_object.isra.0+0x3a/0xa30 [ 1494.687721] should_failslab+0x5/0x20 [ 1494.687733] kmem_cache_alloc+0x5b/0x310 [ 1494.687761] ? kmem_cache_alloc+0x159/0x310 [ 1494.696124] create_object.isra.0+0x3a/0xa30 [ 1494.696674] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1494.697264] kmem_cache_alloc_node+0x169/0x330 [ 1494.697801] __alloc_skb+0x6d/0x5b0 [ 1494.698270] audit_log_start.part.0+0x2a3/0x730 [ 1494.699017] ? audit_log_task_context+0x170/0x170 [ 1494.699581] ? audit_filter+0x5d6/0xb10 [ 1494.700087] ? __bpf_prog_run64+0xe0/0xe0 [ 1494.700700] ? audit_compare_dname_path+0x120/0x120 [ 1494.701522] ? find_held_lock+0x2c/0x110 [ 1494.701997] audit_log_start+0x5f/0x90 [ 1494.702448] audit_seccomp+0x5d/0x200 [ 1494.702971] ? lock_downgrade+0x6d0/0x6d0 [ 1494.703611] __seccomp_filter+0x669/0x1530 [ 1494.704117] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1494.704732] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1494.705404] ? wait_for_completion_io+0x270/0x270 [ 1494.706123] ? fput_many+0x2f/0x1a0 [ 1494.706723] ? ksys_write+0x1a9/0x260 [ 1494.707239] __secure_computing+0x191/0x2f0 [ 1494.707747] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1494.708607] do_syscall_64+0xf/0x40 [ 1494.709034] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1494.709634] RIP: 0033:0x7f8028ff5b19 [ 1494.710060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1494.712181] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1494.713057] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1494.713882] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1494.714703] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1494.715532] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1494.716600] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:19:11 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1f9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000014c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/128, 0x80}, {&(0x7f00000003c0)=""/195, 0xc3}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x3, &(0x7f0000000200)=""/60, 0x3c}, 0x0, 0x40002000, 0x0, {0x2}}, 0x3ff) r1 = syz_io_uring_setup(0x2203, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0, 0xa2c0792771366ceb}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000014c0)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/128, 0x80}, {&(0x7f00000003c0)=""/195, 0xc3}], 0x2, &(0x7f0000000200)=""/60, 0x3c}, 0x0, 0x40002000, 0x0, {0x2}}, 0x3ff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000140)=@IORING_OP_READV=@pass_iovec={0x1, 0x3, 0x2007, @fd_index=0x7, 0x0, 0x0, 0x0, 0x4, 0x1, {0x0, r4}}, 0x8) renameat2(0xffffffffffffffff, &(0x7f0000001500)='./file1\x00', r0, &(0x7f0000001540)='./file1/file0\x00', 0x1) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) mount$9p_unix(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='.\x00', &(0x7f00000000c0), 0x1041440, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,debug', @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC, @ANYBLOB="2c6673757569643d336331e935625d602d326365622d353564342d643663392d63390135303565372c736d61636b66737472616e736d7574653d2f6465762f6c6f5be623002c726f6f74636f6e746578743d756e636f6e66696e65645f752c006c03ac1fa0e42456708d5981e794671b18850a89dc0a390277e640eefc9c9034da1c"]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 17:19:11 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:19:11 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 4) 17:19:11 executing program 1: semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r0 = semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(r0, 0x0, 0xb) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0xf747, 0x8]) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000100)=[{0x3, 0x52e5, 0x1000}, {0x4, 0x40, 0x1800}, {0x4, 0xffd1}], 0x3, &(0x7f0000000180)={r1, r2+60000000}) r3 = semget$private(0x0, 0x1, 0xd2) semtimedop(r3, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$SEM_STAT_ANY(r3, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget$private(0x0, 0x6, 0x0) semop(r4, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}, {0x2, 0x8, 0x800}, {0x4}], 0x4) semtimedop(0x0, &(0x7f00000001c0)=[{0x2, 0xffff}, {0x1, 0x5, 0x1000}], 0x2, &(0x7f0000000200)={0x77359400}) semtimedop(0x0, &(0x7f0000000140)=[{}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$SEM_INFO(r4, 0x5, 0x13, &(0x7f0000000080)=""/101) unshare(0x48020200) 17:19:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x40087602, &(0x7f0000000000)) 17:19:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80045432, 0x0) 17:19:11 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 1) [ 1494.735021] FAULT_INJECTION: forcing a failure. [ 1494.735021] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.736780] CPU: 1 PID: 9573 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1494.737707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1494.738659] Call Trace: [ 1494.738967] dump_stack+0x107/0x167 [ 1494.739387] should_fail.cold+0x5/0xa [ 1494.739831] ? audit_log_start.part.0+0x27e/0x730 [ 1494.740383] should_failslab+0x5/0x20 [ 1494.740821] kmem_cache_alloc+0x5b/0x310 [ 1494.741289] audit_log_start.part.0+0x27e/0x730 [ 1494.741831] ? audit_log_task_context+0x170/0x170 [ 1494.742382] ? audit_filter+0x5d6/0xb10 [ 1494.742842] ? __bpf_prog_run64+0xe0/0xe0 [ 1494.743322] ? audit_compare_dname_path+0x120/0x120 [ 1494.743904] ? find_held_lock+0x2c/0x110 [ 1494.744378] audit_log_start+0x5f/0x90 [ 1494.744825] audit_seccomp+0x5d/0x200 [ 1494.745264] ? lock_downgrade+0x6d0/0x6d0 [ 1494.745745] __seccomp_filter+0x669/0x1530 [ 1494.746234] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1494.746770] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1494.747319] ? wait_for_completion_io+0x270/0x270 [ 1494.747887] ? fput_many+0x2f/0x1a0 [ 1494.748308] ? ksys_write+0x1a9/0x260 [ 1494.748746] __secure_computing+0x191/0x2f0 [ 1494.749245] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1494.749860] do_syscall_64+0xf/0x40 [ 1494.750277] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1494.750868] RIP: 0033:0x7f4f9cabbb19 [ 1494.751297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1494.753424] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1494.754296] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1494.755114] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1494.755944] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1494.756764] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1494.757585] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1494.758548] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 1494.759377] audit: out of memory in audit_log_start [ 1494.768596] audit: type=1326 audit(1761153551.497:3924): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9559 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1494.784919] audit: type=1326 audit(1761153551.498:3925): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9559 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:19:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x4020940d, &(0x7f0000000000)) [ 1494.793716] audit: type=1326 audit(1761153551.498:3926): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9559 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1494.804194] audit: type=1326 audit(1761153551.502:3927): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9559 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 17:19:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80045440, 0x0) [ 1494.813923] audit: type=1326 audit(1761153551.502:3928): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9559 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8028fa85ff code=0x7ffc0000 17:19:11 executing program 1: semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r0 = semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(r0, 0x0, 0xb) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x2, 0xf747, 0x8]) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000100)=[{0x3, 0x52e5, 0x1000}, {0x4, 0x40, 0x1800}, {0x4, 0xffd1}], 0x3, &(0x7f0000000180)={r1, r2+60000000}) r3 = semget$private(0x0, 0x1, 0xd2) semtimedop(r3, &(0x7f0000000000), 0x0, &(0x7f0000000040)) semctl$SEM_STAT_ANY(r3, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget$private(0x0, 0x6, 0x0) semop(r4, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}, {0x2, 0x8, 0x800}, {0x4}], 0x4) semtimedop(0x0, &(0x7f00000001c0)=[{0x2, 0xffff}, {0x1, 0x5, 0x1000}], 0x2, &(0x7f0000000200)={0x77359400}) semtimedop(0x0, &(0x7f0000000140)=[{}], 0x1, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$SEM_INFO(r4, 0x5, 0x13, &(0x7f0000000080)=""/101) unshare(0x48020200) [ 1494.845454] audit: type=1326 audit(1761153551.543:3929): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9564 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:19:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0xa, 0x0, {0xe}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x11, 0x3ffc, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f8"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x3}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x401) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents64(r2, &(0x7f00000007c0)=""/180, 0x200007d8) getdents64(r2, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x1) syz_genetlink_get_family_id$ipvs(0x0, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) lseek(r0, 0x2, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2fe1, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000080)={0x403f}) fallocate(r0, 0x20, 0x400, 0xfffffffffffffffd) ioctl$FS_IOC_ENABLE_VERITY(r4, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0xa1, &(0x7f0000000300)="8f5fe45076579a27474308f84a78398f8be4c22ec9ba63239f84e305e5e3ccd93faaf084b1d45d1f193a0437fb70f6e2abc9049ca0d30a197209c2154a0decd49e491a0ba26ed813b299578fe9d09e1c6886338449eb24a3e5e8ac232059d13209d94d1c2472f058be84afbd8e4bb7943f8b10ea04c1977532419403197e2555f908a1e7bcf04bfae7dc54c41bb81478b78407d5d0336bc3596b11a136ceb8cac6", 0x53, 0x0, &(0x7f0000000500)="3a54f46a74a03e2e67982124846bb1ef39b246cdec1c7b3c3ff7b1615a39a9951c5f3264e29d75c7d7f670f965f19001bc0d6d2e313d388e956fbe83d726fdccd9e81da2eab9fd94f8b134ea60e80f39d97fb5"}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) unshare(0x48020200) 17:19:11 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:19:11 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80045432, &(0x7f0000000000)) [ 1494.923333] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.6'. 17:19:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80086601, 0x0) 17:19:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x80087601, 0x0) [ 1495.144917] Zero length message leads to an empty skb 17:19:23 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc0045878, 0x0) 17:19:23 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80045440, &(0x7f0000000000)) 17:19:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 2) 17:19:23 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:19:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0xe) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000040)={0x0, 0x5, [0x81, 0x0, 0x6, 0x10001, 0xa3, 0x7]}) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000000160011cd29000000000000000a080004fdefae4b0000000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) 17:19:23 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:19:23 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 5) 17:19:23 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4ea0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x71, r1}) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'syztnl1\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2d, 0x1f, 0x1, 0x4, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, 0xe, 0x8, 0x2, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r2, 0x89f4, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', r3, 0x4, 0x4, 0x2, 0x4, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x80, 0x7, 0x10001, 0x4}}) syz_io_uring_setup(0x4c4f, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) r6 = socket$packet(0x11, 0x3, 0x300) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r6, 0x0, 0x0, 0xfffffffffffffe8a}, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r6, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000280)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x35, r8}) [ 1507.169735] kauditd_printk_skb: 33 callbacks suppressed [ 1507.169756] audit: type=1326 audit(1761153563.987:3963): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9605 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1507.193837] FAULT_INJECTION: forcing a failure. [ 1507.193837] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.197434] CPU: 1 PID: 9606 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1507.199220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1507.201403] Call Trace: [ 1507.202106] dump_stack+0x107/0x167 [ 1507.203062] should_fail.cold+0x5/0xa [ 1507.204079] should_failslab+0x5/0x20 [ 1507.205082] __kmalloc_node_track_caller+0x74/0x3b0 [ 1507.206594] ? audit_log_start.part.0+0x2a3/0x730 [ 1507.207870] __alloc_skb+0xb1/0x5b0 [ 1507.208856] audit_log_start.part.0+0x2a3/0x730 [ 1507.210079] ? audit_log_task_context+0x170/0x170 [ 1507.211544] ? audit_filter+0x5d6/0xb10 [ 1507.212665] ? __bpf_prog_run64+0xe0/0xe0 17:19:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc0045878, 0x0) [ 1507.213752] ? audit_compare_dname_path+0x120/0x120 [ 1507.214992] audit: type=1326 audit(1761153563.997:3964): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9605 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1507.215260] ? find_held_lock+0x2c/0x110 [ 1507.218605] audit_log_start+0x5f/0x90 [ 1507.219485] audit_seccomp+0x5d/0x200 [ 1507.220416] ? lock_downgrade+0x6d0/0x6d0 [ 1507.221371] __seccomp_filter+0x669/0x1530 [ 1507.222343] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1507.223317] audit: type=1326 audit(1761153563.998:3965): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9605 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1507.223375] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1507.226901] ? wait_for_completion_io+0x270/0x270 [ 1507.228036] ? fput_many+0x2f/0x1a0 [ 1507.228867] ? ksys_write+0x1a9/0x260 [ 1507.229741] __secure_computing+0x191/0x2f0 [ 1507.230332] audit: type=1326 audit(1761153563.998:3966): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9605 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1507.230726] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1507.230749] do_syscall_64+0xf/0x40 [ 1507.235151] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1507.236321] RIP: 0033:0x7f8028ff5b19 [ 1507.237175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1507.241358] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1507.243076] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1507.244759] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1507.246406] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1507.248065] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1507.249705] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1507.252403] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 1507.254558] audit: out of memory in audit_log_start [ 1507.262068] audit: type=1326 audit(1761153563.998:3967): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9605 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 17:19:24 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x0, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:19:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80086601, &(0x7f0000000000)) [ 1507.277708] audit: type=1326 audit(1761153564.011:3968): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9605 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8028fa85ff code=0x7ffc0000 [ 1507.288932] FAULT_INJECTION: forcing a failure. [ 1507.288932] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.291556] audit: type=1326 audit(1761153564.087:3969): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9611 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1507.291613] audit: type=1326 audit(1761153564.088:3970): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9611 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1507.301469] CPU: 1 PID: 9620 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1507.303003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1507.304875] Call Trace: [ 1507.305481] dump_stack+0x107/0x167 [ 1507.306309] should_fail.cold+0x5/0xa [ 1507.307175] ? create_object.isra.0+0x3a/0xa30 [ 1507.308218] should_failslab+0x5/0x20 [ 1507.309081] kmem_cache_alloc+0x5b/0x310 [ 1507.310001] ? auditd_test_task+0x11e/0x300 [ 1507.310986] create_object.isra.0+0x3a/0xa30 [ 1507.311989] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1507.313144] kmem_cache_alloc+0x159/0x310 [ 1507.314091] audit_log_start.part.0+0x27e/0x730 [ 1507.315145] ? audit_log_task_context+0x170/0x170 [ 1507.316248] ? audit_filter+0x5d6/0xb10 [ 1507.316275] ? __bpf_prog_run64+0xe0/0xe0 [ 1507.316295] ? audit_compare_dname_path+0x120/0x120 [ 1507.316313] ? find_held_lock+0x2c/0x110 [ 1507.316343] audit_log_start+0x5f/0x90 [ 1507.316363] audit_seccomp+0x5d/0x200 [ 1507.316382] ? lock_downgrade+0x6d0/0x6d0 [ 1507.316404] __seccomp_filter+0x669/0x1530 [ 1507.316428] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1507.316449] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1507.316472] ? wait_for_completion_io+0x270/0x270 [ 1507.316502] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1507.316525] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1507.316543] ? ksys_write+0x1a9/0x260 [ 1507.329758] __secure_computing+0x191/0x2f0 [ 1507.330739] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1507.331950] do_syscall_64+0xf/0x40 [ 1507.332776] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1507.333930] RIP: 0033:0x7f4f9cabbb19 [ 1507.334771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1507.338900] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1507.340614] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1507.342217] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1507.343818] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1507.345424] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1507.347024] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:19:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x80087601, &(0x7f0000000000)) 17:19:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc0189436, 0x0) 17:19:24 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:19:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 3) 17:19:24 executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) clock_gettime(0x0, &(0x7f0000001ac0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)=""/81, 0x51}, {&(0x7f0000000440)=""/186, 0xba}, {&(0x7f0000000500)=""/83, 0x53}, {&(0x7f0000000580)=""/88, 0x58}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/104, 0x68}], 0x6, &(0x7f0000001700)=""/205, 0xcd}, 0x7}, {{&(0x7f0000001800)=@rc={0x1f, @none}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001880)=""/237, 0xed}, {&(0x7f0000001980)=""/107, 0x6b}], 0x2}, 0x3}], 0x2, 0x40002000, &(0x7f0000001b00)={r3, r4+10000000}) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x4, {}, 0x5, 0x3, 0x0, {0x0, r7, r5}}, 0x5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001e00)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r2, 0x0, &(0x7f0000001d80)="0a277aa7258b1edef8591e02fc87b6d3af6578cfa8e0218ca04fa75d2cbb4f3b9ea3e939b9f6de397090c5d17970e379e02bc03d3ae770715e7e9a2b7de89c3e1ac99d70829502dde1e7d9e4df4fa204", 0x50, 0x4044880, 0x1, {0x0, r7}}, 0x1000) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001b40), 0x521b02, 0x0) sendto$packet(r8, &(0x7f0000001b80)="8efe0c3b5ef0b3a80dc4eae4db8be3274fb6e39244f6cbe7c68e3b1f7e766ef5e7671cc3d1421b36a0fd8a80f4d7793d6ec7ffe2b3f49b93b7d85b535fcf99ae83b193c9dfd25e474d00b4d1f52b3949019a4022f9a74734363b67a37e88b5a7d11bfe190612707a7188b7f71ae83f3ce4", 0x71, 0x4000, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) fsconfig$FSCONFIG_SET_FD(r9, 0x5, &(0x7f0000001e40)='version=9p2000', 0x0, r0) readv(r2, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/6, 0x6}, {&(0x7f0000000080)=""/123, 0x7b}, {&(0x7f0000000100)=""/112, 0x70}, {&(0x7f0000000180)=""/4, 0x4}, {&(0x7f00000001c0)=""/212, 0xd4}], 0x5) mount$9p_unix(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80), 0x10e0880, &(0x7f0000001cc0)={'trans=unix,', {[{@access_any}, {@afid={'afid', 0x3d, 0x2}}, {@version_9p2000}, {@afid={'afid', 0x3d, 0xfffffffffffff90b}}], [{@smackfsdef={'smackfsdef', 0x3d, '!)'}}, {@subj_type={'subj_type', 0x3d, '/dev/hwrng\x00'}}, {@subj_type={'subj_type', 0x3d, '+'}}, {@fsname={'fsname', 0x3d, '/dev/hwrng\x00'}}, {@seclabel}]}}) [ 1507.478169] FAULT_INJECTION: forcing a failure. [ 1507.478169] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.481240] CPU: 1 PID: 9639 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1507.482834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1507.484768] Call Trace: [ 1507.485562] dump_stack+0x107/0x167 [ 1507.486539] should_fail.cold+0x5/0xa [ 1507.487438] ? __alloc_skb+0x6d/0x5b0 [ 1507.488343] should_failslab+0x5/0x20 [ 1507.489380] kmem_cache_alloc_node+0x55/0x330 [ 1507.490432] ? trace_hardirqs_on+0x5b/0x180 [ 1507.491678] __alloc_skb+0x6d/0x5b0 [ 1507.492554] audit_log_start.part.0+0x2a3/0x730 [ 1507.493649] ? audit_log_task_context+0x170/0x170 [ 1507.494775] ? audit_filter+0x5d6/0xb10 [ 1507.495841] ? __bpf_prog_run64+0xe0/0xe0 [ 1507.496824] ? audit_compare_dname_path+0x120/0x120 [ 1507.498131] ? find_held_lock+0x2c/0x110 [ 1507.499343] audit_log_start+0x5f/0x90 [ 1507.500281] audit_seccomp+0x5d/0x200 [ 1507.501176] ? lock_downgrade+0x6d0/0x6d0 [ 1507.502150] __seccomp_filter+0x669/0x1530 [ 1507.503144] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1507.504315] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1507.505444] ? wait_for_completion_io+0x270/0x270 [ 1507.506574] ? fput_many+0x2f/0x1a0 [ 1507.507421] ? ksys_write+0x1a9/0x260 [ 1507.508327] __secure_computing+0x191/0x2f0 [ 1507.509340] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1507.510582] do_syscall_64+0xf/0x40 [ 1507.511432] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1507.512632] RIP: 0033:0x7f4f9cabbb19 [ 1507.513502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1507.517740] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1507.519496] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1507.521145] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1507.522789] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1507.524439] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1507.526087] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:19:24 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 6) 17:19:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0045878, &(0x7f0000000000)) 17:19:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0xc020660b, 0x0) [ 1507.667249] FAULT_INJECTION: forcing a failure. [ 1507.667249] name failslab, interval 1, probability 0, space 0, times 0 [ 1507.670110] CPU: 1 PID: 9651 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1507.671711] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1507.673465] Call Trace: [ 1507.674076] dump_stack+0x107/0x167 [ 1507.674841] should_fail.cold+0x5/0xa [ 1507.675671] ? create_object.isra.0+0x3a/0xa30 [ 1507.676771] should_failslab+0x5/0x20 [ 1507.677620] kmem_cache_alloc+0x5b/0x310 [ 1507.678594] create_object.isra.0+0x3a/0xa30 [ 1507.679525] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1507.680865] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1507.681925] ? audit_log_start.part.0+0x2a3/0x730 [ 1507.683191] __alloc_skb+0xb1/0x5b0 [ 1507.683969] audit_log_start.part.0+0x2a3/0x730 [ 1507.684949] ? audit_log_task_context+0x170/0x170 [ 1507.685991] ? audit_filter+0x5d6/0xb10 [ 1507.686852] ? __bpf_prog_run64+0xe0/0xe0 [ 1507.687729] ? audit_compare_dname_path+0x120/0x120 [ 1507.688789] ? find_held_lock+0x2c/0x110 [ 1507.689655] audit_log_start+0x5f/0x90 [ 1507.690482] audit_seccomp+0x5d/0x200 [ 1507.691285] ? lock_downgrade+0x6d0/0x6d0 [ 1507.692171] __seccomp_filter+0x669/0x1530 [ 1507.693074] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1507.694054] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1507.695279] ? wait_for_completion_io+0x270/0x270 [ 1507.696305] ? fput_many+0x2f/0x1a0 [ 1507.697069] ? ksys_write+0x1a9/0x260 [ 1507.697879] __secure_computing+0x191/0x2f0 [ 1507.698810] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1507.699990] do_syscall_64+0xf/0x40 [ 1507.700770] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1507.701840] RIP: 0033:0x7f8028ff5b19 [ 1507.702620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1507.706499] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1507.708103] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1507.709603] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1507.711145] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1507.712658] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1507.714189] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:19:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) 17:19:24 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x0, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:19:24 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x22003, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, 0x0, 0x0) add_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000780)='blacklist\x00', &(0x7f00000007c0)={'syz', 0x3}, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r2) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) dup(r3) add_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="b91cf242e173524fe5d125e770d90c3d76d64fa0e7409c4fef01cc016fd5eadaf8d96e1de73c75ca438d57e82e23b41cecd885e76b27ab837deeb3bd5b09ceaeca013bd901e1b89ee5176c", 0x4b, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000180), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0x0) unshare(0x48020200) 17:19:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0045878, &(0x7f0000000000)) 17:19:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3) 17:19:24 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 4) 17:19:24 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc0189436, &(0x7f0000000000)) 17:19:24 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 7) 17:19:24 executing program 6: syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) mount$9p_fd(0x0, &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700), 0x22015, &(0x7f00000009c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="354fcd94733ec26899712999c7ba8deefc48a87f0f6ecd17c5a38a632ed1194630abf88a9869fd8ce8817b6fdb7781c8372a5a5cfe128d435d5103ea04321db9d86f99173c4b5c0cdee1c64f14ee047694978e05ef14d2f72fd6938b7081a043b56df26427bf990ecd2624db95624d818a752850f15c597f1fffe4c4d01ab057ead38ee34108b3c3719351907ffea5aa9b5b832f78fc0320d16864769f8f8112c792c8752cf0852fee888d4a1d57533e594aeac33e3ae29c7acd2613a56aff2c244a2974154db7e5c2ccf41c7ae5c607fd514268c31fbe2eeec1c1cbccb7c99fff7374ca6631ee4df0dae1c58a1d4488c8c50e006f9f02d683c3e418a4b2b4c46c82f3f3ead018c4f5062156a439086fb2cb5ce6a03d73d2f68c0d53b3ef48677464fcb13312b10d539d5e0ae7c470108770d3eb395ddf26b4c8038cc9a981c64b1729408e5abbf8cf12c26efb85d133189b2ba8d15b4408d120ca4f5106056b51aaf4a7abba138eae0398468399dd4bc8bc6769eab037bbdcb51d357c251e8ca41c68aebf05c17aad2d2b", @ANYRESHEX=r2, @ANYBLOB=',dfltgid=', @ANYRESHEX=0xee01, @ANYBLOB=',debug=0x0000000000000005,access=client,dfltgid=', @ANYRESHEX, @ANYBLOB="2c76657273696f6e3d3970323030302e752c706f73697861636c2c6673757569643dbb376434303166662d376139362d353233622d396437632d39366366343330372c6f626a5f747970653d2c646f6e745f6d6561737572652c00"]) getresgid(&(0x7f00000010c0), &(0x7f0000001100)=0x0, &(0x7f0000001140)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@cache_fscache}, {@debug={'debug', 0x3d, 0x924}}, {@nodevmap}, {@noextend}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@afid={'afid', 0x3d, 0x345}}]}}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000100)='./mnt\x00', 0x2, 0x7, &(0x7f0000000500)=[{&(0x7f0000000200)="73a6474174ac82b83efc61b30e317f1bc54ea52e114054d1ea2764cd9b607651d87ad017d6ed69bfa5660f2f50b6ed78205df6ab9af351614bf806ab4543ebbbd8ba7cf5cd2c53a14d9d6b3b9ee536b7f4fe021e0c9181dfee190bc439e6bf639af0a6b22f4c1667ffaf10877a37c0ed4feef54b731c4a879372e037d77fd4f7ec7ddda9f391393f70169368058ceb68c92320c2250d8c8ff714118f810bb70e2264a8785773d69a46", 0xa9}, {&(0x7f00000002c0)="b59802b658051a6f7c0315943b27bfb7241057ab5cb8776de45029ef355557a075c67ed7ad906a90b69aa09713a2e28b4cbfd3c15066bb34f857d9f046caa02e50df9790e007279809d7c83313e7a878f4c44e61c0db3e8a205f0238e786e3bb1a14affb08b2cdad617d509ce2da75f91d6fae3817b368b92265b5c48aa2e643105cb4d73968a95c306f605fc5b9a4846b0db0954e145e8f622afff0a0f9eb7d8861357932b187a659c5fc4500fc2f36140e99bc31cce4e3594e14accaccf2bd8b3949f2c4a363ab96623232cd3266679b0ea1ee9dca1dcf8cd4c037533b44df2f35b5ef512f329fa578074a9244fa", 0xef, 0x9}, {&(0x7f00000003c0)="c6932157f5075ea15b21ab5ef78db55cc24f44da8d4f6977e97a96ab1b988b9f5bec770f621bf4b58024c2072c10a353d3086eab06dad2734c9ae05bc617b98c432be52fa2d042cea72e75", 0x4b, 0x40}, {&(0x7f0000000440)="fac20894f7ae0a16a6b4cb2cf28547a9a5b3c9161edb38c2e9954e8d5c0ac1d01b56f565ab2089c920de15a122dac642d583498ab621328e0f17ba8995f03ebbfb299ed4fcc689da96aa5157de565580ad3aa478b0a381ea8adeb63d2bdf705a3a6e075aa25f23d0a2aa25b469c6a2bb780a778017f585b93caafc869dce0bbe1bb00c401eca385c501fdf2d630912a59282e8bbaa86c492ba3ce1ef2b68c8927f057b3ef71c9aab", 0xa8, 0x3}, {&(0x7f0000000180)="10b3a530c9fbef7e0c03f25dfa2bb5ad2d1c2fed1e04f511511126daccc4c1fe556208862a6539688bf68eb5d626ee5f5747399ac9ad6da19fb11fa1", 0x3c, 0x6}, {&(0x7f00000013c0)="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", 0x1000, 0xfffffffffffff800}, {&(0x7f00000023c0)="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", 0x1000, 0x100000001}], 0x100000, &(0x7f00000005c0)={[{@huge_never}, {@huge_advise}, {}, {@gid={'gid', 0x3d, r3}}], [{@euid_lt={'euid<', r4}}, {@pcr={'pcr', 0x3d, 0x1a}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, 'hugetlbfs\x00'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@audit}]}) mount(0x0, &(0x7f0000000080)='./mnt\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000140)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=ANY=[@ANYBLOB='uid=', @ANYRESHEX, @ANYRESDEC]) [ 1508.036968] FAULT_INJECTION: forcing a failure. [ 1508.036968] name failslab, interval 1, probability 0, space 0, times 0 [ 1508.039984] CPU: 0 PID: 9676 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1508.040004] FAULT_INJECTION: forcing a failure. [ 1508.040004] name failslab, interval 1, probability 0, space 0, times 0 [ 1508.043795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1508.045574] Call Trace: [ 1508.046143] dump_stack+0x107/0x167 [ 1508.046928] should_fail.cold+0x5/0xa [ 1508.047758] should_failslab+0x5/0x20 [ 1508.048584] __kmalloc_track_caller+0x79/0x370 [ 1508.049563] ? sidtab_sid2str_get+0x17e/0x720 [ 1508.050529] kmemdup+0x23/0x50 [ 1508.051227] sidtab_sid2str_get+0x17e/0x720 [ 1508.052157] ? audit_log_format+0xca/0x120 [ 1508.053068] sidtab_entry_to_string+0x33/0x110 [ 1508.054051] security_sid_to_context_core+0x33c/0x5d0 [ 1508.055163] security_secid_to_secctx+0x72/0xc0 [ 1508.056169] audit_log_task_context+0xf0/0x170 [ 1508.057143] ? audit_log_format+0x120/0x120 [ 1508.058066] ? from_kuid+0x85/0xc0 [ 1508.058840] audit_log_task+0x1cd/0x310 [ 1508.059690] ? __audit_log_nfcfg+0x210/0x210 [ 1508.060653] audit_seccomp+0x76/0x200 [ 1508.061460] ? lock_downgrade+0x6d0/0x6d0 [ 1508.062359] __seccomp_filter+0x669/0x1530 [ 1508.063272] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1508.064277] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1508.065312] ? wait_for_completion_io+0x270/0x270 [ 1508.066350] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1508.067328] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1508.068494] ? ksys_write+0x1a9/0x260 [ 1508.069349] __secure_computing+0x191/0x2f0 [ 1508.070277] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1508.071420] do_syscall_64+0xf/0x40 [ 1508.072221] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1508.073314] RIP: 0033:0x7f8028ff5b19 [ 1508.074118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1508.078074] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1508.079677] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1508.081181] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1508.082700] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1508.084232] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1508.085761] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1508.087319] CPU: 1 PID: 9674 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1508.088946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1508.090817] Call Trace: [ 1508.091413] dump_stack+0x107/0x167 [ 1508.092272] should_fail.cold+0x5/0xa [ 1508.093171] ? create_object.isra.0+0x3a/0xa30 [ 1508.094237] should_failslab+0x5/0x20 [ 1508.095124] kmem_cache_alloc+0x5b/0x310 [ 1508.096070] ? kmem_cache_alloc+0x159/0x310 [ 1508.097067] create_object.isra.0+0x3a/0xa30 [ 1508.098078] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1508.099269] kmem_cache_alloc_node+0x169/0x330 [ 1508.100367] __alloc_skb+0x6d/0x5b0 [ 1508.101215] audit_log_start.part.0+0x2a3/0x730 [ 1508.102294] ? audit_log_task_context+0x170/0x170 [ 1508.103381] ? audit_filter+0x5d6/0xb10 [ 1508.104344] ? __bpf_prog_run64+0xe0/0xe0 [ 1508.105302] ? audit_compare_dname_path+0x120/0x120 [ 1508.106451] ? find_held_lock+0x2c/0x110 [ 1508.107397] audit_log_start+0x5f/0x90 [ 1508.108300] audit_seccomp+0x5d/0x200 [ 1508.109172] ? lock_downgrade+0x6d0/0x6d0 [ 1508.110138] __seccomp_filter+0x669/0x1530 [ 1508.111137] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1508.112259] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1508.113376] ? wait_for_completion_io+0x270/0x270 [ 1508.114514] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1508.115586] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1508.116868] ? ksys_write+0x1a9/0x260 [ 1508.117736] __secure_computing+0x191/0x2f0 [ 1508.118758] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1508.119981] do_syscall_64+0xf/0x40 [ 1508.120782] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1508.121912] RIP: 0033:0x7f4f9cabbb19 [ 1508.122948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1508.127299] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1508.129243] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1508.130896] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1508.132687] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1508.134301] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1508.135921] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:19:24 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x0, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1521.863927] kauditd_printk_skb: 105 callbacks suppressed [ 1521.863939] audit: type=1326 audit(1761153578.682:4073): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9694 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1521.868296] audit: type=1326 audit(1761153578.682:4074): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9694 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1521.876785] audit: type=1326 audit(1761153578.694:4075): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9694 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:19:38 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x0, 0x6, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:19:38 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:19:38 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x3) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x3602, &(0x7f00000000c0)={&(0x7f0000001100)={0x30, 0x18, 0x1, 0x0, 0x0, {0xa}, [@typed={0x0, 0x0, 0x0, 0x0, @pid}, @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@private1}]}, 0x30}}, 0x0) 17:19:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x300) 17:19:38 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 8) 17:19:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0xc020660b, &(0x7f0000000000)) 17:19:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 5) 17:19:38 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x22003, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, 0x0, 0x0) add_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000780)='blacklist\x00', &(0x7f00000007c0)={'syz', 0x3}, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x7, r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, 0x0, 0x0, r2) keyctl$revoke(0x3, r2) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="5d695253bf965968c671b1e492afd0fe4663547755d6f5af5455e525491b1c0330ab94756093496a5116f77bb1dd1521c530f0f47c3ee0cffc1dabf3f7d03e0c6176ac02701292cd9e2815c36eeaced9412baa9b8a3deeda4def8ed07ad0899203d2c4", 0x63, 0x0) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000440), 0x2, 0x0) dup(r3) add_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="b91cf242e173524fe5d125e770d90c3d76d64fa0e7409c4fef01cc016fd5eadaf8d96e1de73c75ca438d57e82e23b41cecd885e76b27ab837deeb3bd5b09ceaeca013bd901e1b89ee5176c", 0x4b, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000180), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0x0) unshare(0x48020200) [ 1521.895210] audit: type=1326 audit(1761153578.694:4076): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9694 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1521.902883] audit: type=1326 audit(1761153578.695:4077): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9694 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:19:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) [ 1521.916167] FAULT_INJECTION: forcing a failure. [ 1521.916167] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.919084] CPU: 0 PID: 9695 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1521.920306] audit: type=1326 audit(1761153578.706:4078): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9694 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 [ 1521.920705] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1521.920729] Call Trace: [ 1521.926625] dump_stack+0x107/0x167 [ 1521.927491] should_fail.cold+0x5/0xa [ 1521.928409] ? create_object.isra.0+0x3a/0xa30 [ 1521.929489] should_failslab+0x5/0x20 [ 1521.930389] kmem_cache_alloc+0x5b/0x310 [ 1521.931358] ? sidtab_sid2str_get+0x65/0x720 [ 1521.932417] create_object.isra.0+0x3a/0xa30 [ 1521.933459] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1521.934660] __kmalloc_track_caller+0x177/0x370 [ 1521.935291] audit: type=1326 audit(1761153578.707:4079): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9694 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8028fa85ff code=0x7ffc0000 [ 1521.935757] ? sidtab_sid2str_get+0x17e/0x720 [ 1521.935789] kmemdup+0x23/0x50 [ 1521.940868] sidtab_sid2str_get+0x17e/0x720 [ 1521.941882] ? audit_log_format+0xca/0x120 [ 1521.942883] sidtab_entry_to_string+0x33/0x110 [ 1521.943961] security_sid_to_context_core+0x33c/0x5d0 [ 1521.945195] security_secid_to_secctx+0x72/0xc0 [ 1521.946292] audit_log_task_context+0xf0/0x170 [ 1521.947363] ? audit_log_format+0x120/0x120 [ 1521.948379] ? from_kuid+0x85/0xc0 [ 1521.949186] audit: type=1326 audit(1761153578.725:4080): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9701 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1521.949254] audit: type=1326 audit(1761153578.725:4081): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9701 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1521.954158] audit_log_task+0x1cd/0x310 [ 1521.954180] ? __audit_log_nfcfg+0x210/0x210 [ 1521.954219] audit_seccomp+0x76/0x200 [ 1521.960288] __seccomp_filter+0x669/0x1530 [ 1521.961279] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1521.962393] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 1521.962416] ? clockevents_program_event+0x131/0x360 [ 1521.962463] __secure_computing+0x191/0x2f0 [ 1521.962488] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1521.962511] do_syscall_64+0xf/0x40 17:19:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x1000000) [ 1521.962531] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1521.962545] RIP: 0033:0x7f8028ff5b19 [ 1521.962565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1521.962576] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1521.962597] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1521.962608] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1521.962619] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1521.962631] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 17:19:38 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 9) 17:19:38 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 6) [ 1521.962642] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1521.967441] FAULT_INJECTION: forcing a failure. [ 1521.967441] name failslab, interval 1, probability 0, space 0, times 0 [ 1521.967452] CPU: 1 PID: 9705 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1521.967458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1521.967462] Call Trace: [ 1521.967479] dump_stack+0x107/0x167 [ 1521.967492] should_fail.cold+0x5/0xa [ 1521.967505] should_failslab+0x5/0x20 17:19:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x2000000) 17:19:38 executing program 6: sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x7, 0x7}, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) madvise(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x14) epoll_create(0x1) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffd, 0x8a, 0x81, @buffer={0x0, 0x1000, &(0x7f0000001e00)=""/4096}, &(0x7f00000002c0)="563527fbb965f6c3a116cada0c2522a26e2f865877dfa2ade8c6e1bb4b97057865358633043f8f94f054c76248132b1bd78c2af433090d867336bb954fd0c04151a1f86eb864f18d58f8caf7bca248d281c915e16cc9b4aad22186c29de23b3d3bc1dcdb5c9d27e140ef162f846491daf74920ff983d89f13b362bf3a55f33103351927a41994fd6decb", &(0x7f0000000200)=""/127, 0x3, 0x2, 0x1, &(0x7f0000000140)}) [ 1521.967516] __kmalloc_node_track_caller+0x74/0x3b0 [ 1521.967525] ? audit_log_start.part.0+0x2a3/0x730 [ 1521.967542] __alloc_skb+0xb1/0x5b0 [ 1521.967555] audit_log_start.part.0+0x2a3/0x730 [ 1521.967567] ? audit_log_task_context+0x170/0x170 [ 1521.967577] ? audit_filter+0x5d6/0xb10 [ 1521.967592] ? __bpf_prog_run64+0xe0/0xe0 [ 1521.967603] ? audit_compare_dname_path+0x120/0x120 [ 1521.967613] ? find_held_lock+0x2c/0x110 17:19:39 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x8001, 0x8, 0x5}) fcntl$getflags(r0, 0x3) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) [ 1521.967629] audit_log_start+0x5f/0x90 [ 1521.967641] audit_seccomp+0x5d/0x200 [ 1521.967651] ? lock_downgrade+0x6d0/0x6d0 [ 1521.967663] __seccomp_filter+0x669/0x1530 [ 1521.967676] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1521.967688] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1521.967700] ? wait_for_completion_io+0x270/0x270 [ 1521.967715] ? fput_many+0x2f/0x1a0 [ 1521.967725] ? ksys_write+0x1a9/0x260 [ 1521.967738] __secure_computing+0x191/0x2f0 [ 1521.967752] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1521.967763] do_syscall_64+0xf/0x40 [ 1521.967774] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1521.967781] RIP: 0033:0x7f4f9cabbb19 [ 1521.967792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1521.967798] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1521.967809] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1521.967816] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1521.967822] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1521.967829] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1521.967835] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1521.968022] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 1522.144888] FAULT_INJECTION: forcing a failure. [ 1522.144888] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.144910] CPU: 0 PID: 9716 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1522.144921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1522.144927] Call Trace: [ 1522.144952] dump_stack+0x107/0x167 [ 1522.144976] should_fail.cold+0x5/0xa [ 1522.144997] ? audit_log_d_path+0xce/0x190 [ 1522.145016] should_failslab+0x5/0x20 [ 1522.145037] kmem_cache_alloc_trace+0x55/0x320 [ 1522.145063] audit_log_d_path+0xce/0x190 [ 1522.145083] audit_log_d_path_exe+0x40/0x70 [ 1522.145101] audit_log_task+0x278/0x310 [ 1522.145120] ? __audit_log_nfcfg+0x210/0x210 [ 1522.145153] audit_seccomp+0x76/0x200 [ 1522.145172] ? lock_downgrade+0x6d0/0x6d0 [ 1522.145194] __seccomp_filter+0x669/0x1530 [ 1522.145219] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1522.145240] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1522.145263] ? wait_for_completion_io+0x270/0x270 [ 1522.145294] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1522.145316] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1522.145340] ? ksys_write+0x1a9/0x260 [ 1522.145365] __secure_computing+0x191/0x2f0 [ 1522.145390] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1522.145412] do_syscall_64+0xf/0x40 [ 1522.145432] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1522.145445] RIP: 0033:0x7f8028ff5b19 [ 1522.145466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1522.145477] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1522.145499] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1522.145511] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1522.145522] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1522.145534] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1522.145545] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1522.278862] FAULT_INJECTION: forcing a failure. [ 1522.278862] name failslab, interval 1, probability 0, space 0, times 0 [ 1522.278886] CPU: 0 PID: 9725 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1522.278897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1522.278903] Call Trace: [ 1522.278928] dump_stack+0x107/0x167 [ 1522.278950] should_fail.cold+0x5/0xa [ 1522.278973] ? create_object.isra.0+0x3a/0xa30 [ 1522.278992] should_failslab+0x5/0x20 [ 1522.279011] kmem_cache_alloc+0x5b/0x310 [ 1522.279037] create_object.isra.0+0x3a/0xa30 [ 1522.279054] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1522.279082] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1522.279098] ? audit_log_start.part.0+0x2a3/0x730 [ 1522.279127] __alloc_skb+0xb1/0x5b0 [ 1522.279151] audit_log_start.part.0+0x2a3/0x730 [ 1522.279173] ? audit_log_task_context+0x170/0x170 [ 1522.279190] ? audit_filter+0x5d6/0xb10 [ 1522.279217] ? __bpf_prog_run64+0xe0/0xe0 [ 1522.279237] ? audit_compare_dname_path+0x120/0x120 [ 1522.279256] ? find_held_lock+0x2c/0x110 [ 1522.279292] audit_log_start+0x5f/0x90 [ 1522.279313] audit_seccomp+0x5d/0x200 [ 1522.279331] ? lock_downgrade+0x6d0/0x6d0 [ 1522.279353] __seccomp_filter+0x669/0x1530 [ 1522.279376] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1522.279399] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1522.279426] ? wait_for_completion_io+0x270/0x270 [ 1522.279456] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1522.279478] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1522.279494] ? ksys_write+0x1a9/0x260 [ 1522.279517] __secure_computing+0x191/0x2f0 [ 1522.279542] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1522.279565] do_syscall_64+0xf/0x40 [ 1522.279585] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1522.279598] RIP: 0033:0x7f4f9cabbb19 [ 1522.279619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1522.279629] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1522.279651] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1522.279663] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1522.279674] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1522.279685] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1522.279697] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:19:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f0000001200)={0x88318d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x3, 0x5}, &(0x7f0000000140)=':\x15\x00U\x1bT;\xfa4\x9ad\xa0\x9d&\xb0Z\xdfv\x8b\x84\x87\xa8K\xff\xb5\xce\xb4\xa7\xab\xc6\xf1\a\xdb\xc2m\xb2w\b\xb7*v\xfdo\x83\'\xd9\x04\x00\x00\x00@\xc1\xf6\xe4;\xa6\x01.\xea\xdb\xf4\xf5F\xc0H\v\x8d\xbc\x9e)&nH\x032\x15\x80\x19\xc0\fn\xdc\t\x00\x00\x00\x00\x00\x00\x00\xdb\x8e\xd3\x80*i\x82CT\xb3jC\x94\x15\xc6\xc1\xc2\x82\x83\xdc\xf6sqF\x01X', 0xffffffffffffffff) 17:19:52 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:19:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x19da}) 17:19:52 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 10) [ 1535.568674] kauditd_printk_skb: 67 callbacks suppressed [ 1535.568695] audit: type=1326 audit(1761153592.385:4148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9737 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1535.577593] FAULT_INJECTION: forcing a failure. [ 1535.577593] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.580386] CPU: 1 PID: 9740 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1535.581867] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1535.583659] Call Trace: [ 1535.584244] dump_stack+0x107/0x167 [ 1535.585037] should_fail.cold+0x5/0xa [ 1535.585859] should_failslab+0x5/0x20 [ 1535.586645] audit: type=1326 audit(1761153592.385:4149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9737 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1535.586688] __kmalloc_track_caller+0x79/0x370 [ 1535.586717] ? sidtab_sid2str_get+0x17e/0x720 [ 1535.593767] kmemdup+0x23/0x50 [ 1535.593789] sidtab_sid2str_get+0x17e/0x720 [ 1535.593814] sidtab_entry_to_string+0x33/0x110 [ 1535.593840] security_sid_to_context_core+0x33c/0x5d0 [ 1535.593868] security_secid_to_secctx+0x72/0xc0 [ 1535.593892] audit_log_task_context+0xf0/0x170 [ 1535.593909] ? audit_log_format+0x120/0x120 17:19:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x100000000d9b) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x91) r2 = openat$hpet(0xffffffffffffff9c, 0x0, 0x2002, 0x0) r3 = creat(&(0x7f0000000000)='./file2\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000240)={'wlan0\x00'}) [ 1535.593925] ? from_kuid+0x85/0xc0 [ 1535.593960] audit_log_task+0x1cd/0x310 [ 1535.593980] ? __audit_log_nfcfg+0x210/0x210 [ 1535.594014] audit_seccomp+0x76/0x200 [ 1535.594032] ? lock_downgrade+0x6d0/0x6d0 [ 1535.594054] __seccomp_filter+0x669/0x1530 [ 1535.594077] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1535.594099] ? __mutex_unlock_slowpath+0xe1/0x600 ioctl$BTRFS_IOC_SPACE_INFO(r4, 0xc0109414, &(0x7f0000004bc0)=ANY=[@ANYBLOB="ca020000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ca9e09782f054700dae7100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007f59891a1c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e22000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002990000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009d7741b8ecdc8186a0a92113000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000565be6e5f80573d11c6d0a6c151fc6bb40ef1c5c24fd3e9c56eb7d242dd9d2c1867bebdbb160fbe1873ad1d2837058a599d30d8410ebcc6334a5c7e1a4046b0099fbc5d936b0648d0c03e0bbacc587a73b9dfcfbe674ced3b9cbc08ef85363db6e4e62462dfd4e84a7a35a5a4c261119413851af63f821b55078f67861c1faa72071c4df0cab1f59598bdd21cda495659508f91e30da18ee7233b30ae0f13caeac4e3f5da06a0be5a1"]) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000049c0)=ANY=[@ANYRESOCT, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="200100000000000000000000000000027f00000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="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"], 0x134}}, 0x0) close(r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) dup(r2) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000000c0)={0x6200, 0x1f, 0x1}) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r1, 0xc7d1000) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r5, 0x0, r1, 0x0, 0x200f5ef, 0x0) 17:19:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x3000000) 17:19:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 7) 17:19:52 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:19:52 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0xda19}) [ 1535.594121] ? wait_for_completion_io+0x270/0x270 [ 1535.594149] ? fput_many+0x2f/0x1a0 [ 1535.594166] ? ksys_write+0x1a9/0x260 [ 1535.594189] __secure_computing+0x191/0x2f0 17:19:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0xfdfdffff) 17:19:52 executing program 1: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x21000, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x204047c, &(0x7f0000000040)=ANY=[@ANYBLOB='grpjquota=3']) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x20010, 0xffffffffffffffff, 0x8000000) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x2000008, 0x12, 0xffffffffffffffff, 0x10000000) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ff1000/0xf000)=nil, 0xf000, 0x5000003, 0x4000010, r5, 0x10000000) fstat(r5, &(0x7f00000003c0)) r7 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x216c00, 0x0) syz_io_uring_submit(r2, r6, &(0x7f0000000380)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x0, {0x0, r7}, 0x2, 0x9, 0x1, {0x0, 0x0, r0}}, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x4, {}, 0x5, 0x3, 0x0, {0x0, 0x0, r4}}, 0x5) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_STATX={0x15, 0x5, 0x0, r1, &(0x7f0000000180), &(0x7f0000000080)='./file0\x00', 0x100, 0x2000, 0x1}, 0x3) 17:19:52 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="23003fb42809a2dbb30000120001050000000000000000070000400000000000000000000000000000000000000000000000000000000000bffcca370000000000000000ce00180797cdad2abac467ec9dbd7ca62be974f4d2475495835b8832a389ed2823c370605fa15bbb028006733082846430cc1720da40c9595725ed6969a1c71b28fd9c8834f21e40b06df3a25f46b6ba5e1ccb0507d9ecf0f26559993b0d9eaf2681c18a", @ANYRES32=0x0, @ANYBLOB='\x00'/16, @ANYBLOB="7d51a7cafa90d91d2e99701b9127e0539459cb3eb49bb26454ea06755ca9010a7555367ff13ef89553a6702e5e882f29b63ff7f887d8bdc22ac7af03e699c2abe4d4c7b934bd4a96a7a0f877c46dd8bf9421abb0265700b00f2549fd3f7f0f7b71c311f7375f00e58dde7182a980"], 0x4c}}, 0x0) [ 1535.594214] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1535.594235] do_syscall_64+0xf/0x40 [ 1535.594254] entry_SYSCALL_64_after_hwframe+0x67/0xd1 17:19:52 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 11) 17:19:52 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 8) [ 1535.594267] RIP: 0033:0x7f4f9cabbb19 [ 1535.594287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:19:52 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(r0, &(0x7f0000000200)='./file1\x00', 0x420002, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000110}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x28281, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="644fb21adbf597c24fe15f7b048e2183c49ec836707522d2278e10e38b7d26aea946aad2596302205f2d0dfbb13690b7ad3700000000000000000000000000000000e3fa28e89233fe12f63d6d62c76d507a74b2780699"]) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4008240b, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78}) 17:19:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0xfffffdfd) [ 1535.594297] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1535.594318] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 17:19:52 executing program 6: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000440)={0x7, 0x79, 0x2}, 0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000400)) [ 1535.594329] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1535.594340] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1535.594350] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1535.594361] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1535.594567] audit: error in audit_log_task_context [ 1535.613664] audit: type=1326 audit(1761153592.386:4150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9737 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1535.613779] audit: type=1326 audit(1761153592.389:4151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9737 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4f9ca6ea04 code=0x7ffc0000 [ 1535.613885] audit: type=1326 audit(1761153592.394:4152): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9737 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f4f9ca6e5ff code=0x7ffc0000 [ 1535.613983] audit: type=1326 audit(1761153592.417:4154): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9731 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1535.614092] audit: type=1326 audit(1761153592.418:4155): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9731 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1535.621223] audit: type=1326 audit(1761153592.439:4156): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9731 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1535.623020] audit: type=1326 audit(1761153592.439:4157): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9731 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1535.632135] FAULT_INJECTION: forcing a failure. [ 1535.632135] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.632172] CPU: 1 PID: 9743 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1535.632192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1535.632206] Call Trace: [ 1535.632251] dump_stack+0x107/0x167 [ 1535.632274] should_fail.cold+0x5/0xa [ 1535.632299] ? create_object.isra.0+0x3a/0xa30 [ 1535.632320] should_failslab+0x5/0x20 [ 1535.632344] kmem_cache_alloc+0x5b/0x310 [ 1535.632365] ? audit_log_d_path+0xce/0x190 [ 1535.632389] create_object.isra.0+0x3a/0xa30 [ 1535.632412] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1535.632438] kmem_cache_alloc_trace+0x151/0x320 [ 1535.632470] audit_log_d_path+0xce/0x190 [ 1535.632489] audit_log_d_path_exe+0x40/0x70 [ 1535.632506] audit_log_task+0x278/0x310 [ 1535.632529] ? __audit_log_nfcfg+0x210/0x210 [ 1535.632560] audit_seccomp+0x76/0x200 [ 1535.632584] ? lock_downgrade+0x6d0/0x6d0 [ 1535.632608] __seccomp_filter+0x669/0x1530 [ 1535.632633] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1535.632655] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1535.632677] ? wait_for_completion_io+0x270/0x270 [ 1535.632708] ? fput_many+0x2f/0x1a0 [ 1535.632728] ? ksys_write+0x1a9/0x260 [ 1535.632750] __secure_computing+0x191/0x2f0 [ 1535.632776] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1535.632798] do_syscall_64+0xf/0x40 [ 1535.632822] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1535.632840] RIP: 0033:0x7f8028ff5b19 [ 1535.632865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1535.632882] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1535.632917] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1535.632935] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1535.632953] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1535.632971] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1535.632990] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1535.801406] EXT4-fs (sda): journaled quota format not specified [ 1535.814288] EXT4-fs (sda): journaled quota format not specified [ 1535.964361] FAULT_INJECTION: forcing a failure. [ 1535.964361] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.964453] CPU: 0 PID: 9768 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1535.964471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1535.964478] Call Trace: [ 1535.964506] dump_stack+0x107/0x167 [ 1535.964529] should_fail.cold+0x5/0xa [ 1535.964555] ? __do_sys_memfd_create+0xfb/0x450 [ 1535.964574] should_failslab+0x5/0x20 [ 1535.964594] __kmalloc+0x72/0x390 [ 1535.964623] __do_sys_memfd_create+0xfb/0x450 [ 1535.964639] ? ksys_write+0x1a9/0x260 [ 1535.964659] ? memfd_file_seals_ptr+0x170/0x170 [ 1535.964682] ? __secure_computing+0x199/0x2f0 [ 1535.964712] do_syscall_64+0x33/0x40 [ 1535.964734] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1535.964747] RIP: 0033:0x7f8028ff5b19 [ 1535.964767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1535.964779] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1535.964801] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1535.964814] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1535.964825] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1535.964837] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1535.964849] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1535.970204] FAULT_INJECTION: forcing a failure. [ 1535.970204] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.970224] CPU: 1 PID: 9766 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1535.970234] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1535.970240] Call Trace: [ 1535.970264] dump_stack+0x107/0x167 [ 1535.970285] should_fail.cold+0x5/0xa [ 1535.970307] ? create_object.isra.0+0x3a/0xa30 [ 1535.970324] should_failslab+0x5/0x20 [ 1535.970342] kmem_cache_alloc+0x5b/0x310 [ 1535.970362] ? sidtab_sid2str_get+0x65/0x720 [ 1535.970384] create_object.isra.0+0x3a/0xa30 [ 1535.970399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1535.970423] __kmalloc_track_caller+0x177/0x370 [ 1535.970440] ? sidtab_sid2str_get+0x17e/0x720 [ 1535.970461] kmemdup+0x23/0x50 [ 1535.970488] sidtab_sid2str_get+0x17e/0x720 [ 1535.970503] ? audit_log_format+0xca/0x120 [ 1535.970524] sidtab_entry_to_string+0x33/0x110 [ 1535.970548] security_sid_to_context_core+0x33c/0x5d0 [ 1535.970573] security_secid_to_secctx+0x72/0xc0 [ 1535.970593] audit_log_task_context+0xf0/0x170 [ 1535.970608] ? audit_log_format+0x120/0x120 [ 1535.970624] ? from_kuid+0x85/0xc0 [ 1535.970654] audit_log_task+0x1cd/0x310 [ 1535.970671] ? __audit_log_nfcfg+0x210/0x210 [ 1535.970701] audit_seccomp+0x76/0x200 [ 1535.970718] ? lock_downgrade+0x6d0/0x6d0 [ 1535.970738] __seccomp_filter+0x669/0x1530 [ 1535.970760] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1535.970780] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1535.970800] ? wait_for_completion_io+0x270/0x270 [ 1535.970826] ? fput_many+0x2f/0x1a0 [ 1535.970841] ? ksys_write+0x1a9/0x260 [ 1535.970863] __secure_computing+0x191/0x2f0 [ 1535.970886] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1535.970906] do_syscall_64+0xf/0x40 [ 1535.970924] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1535.970935] RIP: 0033:0x7f4f9cabbb19 [ 1535.970953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1535.970962] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1535.970981] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1535.970991] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1535.971001] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1535.971011] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1535.971021] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:20:07 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 9) 17:20:07 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:20:07 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 12) 17:20:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x100000000000000) 17:20:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4000, 0x138) setsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$WPAN_WANTLQI(r0, 0x0, 0x3, &(0x7f00000001c0), &(0x7f0000000400)=0x4) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x278) r3 = syz_open_procfs(0x0, 0x0) lseek(r3, 0xfffffffffffffffa, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000180)=0x0) socket$netlink(0x10, 0x3, 0x12) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f0000001400)=""/53, 0x35) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000000)={0x40002001}, r5}, 0x81) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x0, 0x0, r2, &(0x7f0000000300), &(0x7f0000000200)='./file1\x00', 0x200, 0x800}, 0xfffffffe) syz_open_procfs(r4, 0x0) syz_open_procfs(r4, &(0x7f0000000240)='net/rpc\x00') sendfile(r0, r1, 0x0, 0x100000001) 17:20:07 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBLED(r0, 0x4b65, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x9) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x0) keyctl$get_security(0x11, r1, 0x0, 0x0) getuid() keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0)='%\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x4) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) ioctl$BTRFS_IOC_SPACE_INFO(r2, 0xc0109414, &(0x7f0000004d40)={0x473, 0xfffffffffffffff9, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x400000000000095, 0x0) 17:20:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 17:20:07 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:20:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbe76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29f9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r0}}, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x1f, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r2, 0xf504, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e23, 0x20, @loopback, 0x7}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0x1}], 0x1}, 0x3fec2221fdcd2239) r3 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) lseek(r3, 0x4, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x23456}, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) io_uring_enter(r4, 0x10, 0xf744, 0x0, &(0x7f0000000240)={[0x5]}, 0x8) r6 = syz_io_uring_setup(0x20, &(0x7f0000000100)={0x0, 0xb4fb, 0x0, 0x0, 0x0, 0x0, r5}, &(0x7f0000ab3000/0x1000)=nil, &(0x7f0000006000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0x12, 0x0, 0x0) [ 1550.773202] kauditd_printk_skb: 62 callbacks suppressed [ 1550.773222] audit: type=1326 audit(1761153607.591:4219): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9787 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1550.789098] audit: type=1326 audit(1761153607.605:4220): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9787 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1550.794170] FAULT_INJECTION: forcing a failure. [ 1550.794170] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.796090] CPU: 1 PID: 9794 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1550.796898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1550.797857] Call Trace: [ 1550.798163] dump_stack+0x107/0x167 [ 1550.798590] should_fail.cold+0x5/0xa [ 1550.799032] ? audit_log_d_path+0xce/0x190 [ 1550.799529] should_failslab+0x5/0x20 [ 1550.799990] kmem_cache_alloc_trace+0x55/0x320 [ 1550.800548] audit_log_d_path+0xce/0x190 [ 1550.801019] audit_log_d_path_exe+0x40/0x70 [ 1550.801520] audit_log_task+0x278/0x310 [ 1550.801978] ? __audit_log_nfcfg+0x210/0x210 [ 1550.802498] audit_seccomp+0x76/0x200 [ 1550.802938] ? lock_downgrade+0x6d0/0x6d0 [ 1550.803422] __seccomp_filter+0x669/0x1530 [ 1550.803925] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1550.804474] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1550.805050] ? wait_for_completion_io+0x270/0x270 [ 1550.805236] FAULT_INJECTION: forcing a failure. [ 1550.805236] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.805627] ? copy_kernel_to_fpregs+0x9e/0xe0 [ 1550.805640] ? trace_event_raw_event_x86_fpu+0x390/0x390 [ 1550.805649] ? ksys_write+0x1a9/0x260 [ 1550.805662] __secure_computing+0x191/0x2f0 [ 1550.805675] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1550.805697] do_syscall_64+0xf/0x40 [ 1550.811137] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1550.811751] RIP: 0033:0x7f4f9cabbb19 [ 1550.812184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1550.814337] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1550.815227] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1550.816065] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1550.816914] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1550.817758] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1550.818582] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1550.819441] CPU: 0 PID: 9788 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1550.820949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1550.822753] Call Trace: [ 1550.823332] dump_stack+0x107/0x167 [ 1550.824134] should_fail.cold+0x5/0xa [ 1550.824975] ? create_object.isra.0+0x3a/0xa30 [ 1550.825961] should_failslab+0x5/0x20 [ 1550.826789] kmem_cache_alloc+0x5b/0x310 [ 1550.827667] create_object.isra.0+0x3a/0xa30 [ 1550.828627] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1550.829739] __kmalloc+0x16e/0x390 [ 1550.830518] __do_sys_memfd_create+0xfb/0x450 [ 1550.831496] ? ksys_write+0x1a9/0x260 17:20:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x19da}) [ 1550.832503] ? memfd_file_seals_ptr+0x170/0x170 [ 1550.833533] ? __secure_computing+0x199/0x2f0 [ 1550.834518] do_syscall_64+0x33/0x40 [ 1550.835331] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1550.836455] RIP: 0033:0x7f8028ff5b19 [ 1550.837268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1550.841302] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1550.842976] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1550.844578] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1550.846166] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1550.847731] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1550.849323] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1550.866609] audit: type=1326 audit(1761153607.605:4221): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1550.882816] audit: type=1326 audit(1761153607.606:4222): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:20:07 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0xda19}) [ 1550.905038] audit: type=1326 audit(1761153607.606:4224): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1550.919514] audit: type=1326 audit(1761153607.606:4223): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9787 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:20:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x200000000000000) [ 1550.930860] audit: type=1326 audit(1761153607.606:4225): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1550.954533] audit: type=1326 audit(1761153607.606:4226): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9787 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:20:07 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1550.967901] audit: type=1326 audit(1761153607.609:4227): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4f9ca6ea04 code=0x7ffc0000 [ 1550.980875] audit: type=1326 audit(1761153607.611:4228): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9793 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f4f9ca6e5ff code=0x7ffc0000 17:20:07 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 13) [ 1551.075984] FAULT_INJECTION: forcing a failure. [ 1551.075984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1551.077612] CPU: 1 PID: 9817 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1551.078402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1551.079372] Call Trace: [ 1551.079684] dump_stack+0x107/0x167 [ 1551.080105] should_fail.cold+0x5/0xa [ 1551.080565] _copy_from_user+0x2e/0x1b0 [ 1551.081034] __do_sys_memfd_create+0x16d/0x450 [ 1551.081574] ? memfd_file_seals_ptr+0x170/0x170 [ 1551.082119] ? __secure_computing+0x199/0x2f0 [ 1551.082652] do_syscall_64+0x33/0x40 [ 1551.083093] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1551.083699] RIP: 0033:0x7f8028ff5b19 [ 1551.084134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1551.086278] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1551.087160] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1551.087991] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1551.088828] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1551.089652] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1551.090475] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1564.925713] kauditd_printk_skb: 42 callbacks suppressed [ 1564.925725] audit: type=1326 audit(1761153621.744:4271): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1564.930169] audit: type=1326 audit(1761153621.748:4272): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1564.935528] audit: type=1326 audit(1761153621.748:4273): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1564.938941] FAULT_INJECTION: forcing a failure. [ 1564.938941] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.940709] CPU: 0 PID: 9829 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1564.941644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.942731] Call Trace: [ 1564.943093] dump_stack+0x107/0x167 [ 1564.943596] should_fail.cold+0x5/0xa [ 1564.944117] ? create_object.isra.0+0x3a/0xa30 [ 1564.944746] should_failslab+0x5/0x20 [ 1564.945264] kmem_cache_alloc+0x5b/0x310 [ 1564.945825] create_object.isra.0+0x3a/0xa30 [ 1564.946431] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1564.947132] kmem_cache_alloc_trace+0x151/0x320 [ 1564.947776] audit_log_d_path+0xce/0x190 [ 1564.948318] audit_log_d_path_exe+0x40/0x70 [ 1564.948922] audit_log_task+0x278/0x310 [ 1564.949465] ? __audit_log_nfcfg+0x210/0x210 [ 1564.950071] audit_seccomp+0x76/0x200 [ 1564.950590] ? lock_downgrade+0x6d0/0x6d0 [ 1564.951159] __seccomp_filter+0x669/0x1530 [ 1564.951732] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1564.952366] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1564.953033] ? wait_for_completion_io+0x270/0x270 [ 1564.953688] ? fput_many+0x2f/0x1a0 [ 1564.954181] ? ksys_write+0x1a9/0x260 [ 1564.954698] __secure_computing+0x191/0x2f0 [ 1564.955291] syscall_trace_enter.constprop.0+0x84/0x1e0 [ 1564.956014] do_syscall_64+0xf/0x40 [ 1564.956504] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1564.957201] RIP: 0033:0x7f4f9cabbb19 [ 1564.957705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.960192] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1564.961253] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1564.962263] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1564.963209] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1564.964221] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1564.965236] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:20:21 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 10) 17:20:21 executing program 6: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000e40)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x42, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x0, 0x0, 0x1000002) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r1, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000040)='.\x00', 0x2000003) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', 0x0, 0x54, 0x3) r4 = syz_io_uring_setup(0x0, &(0x7f0000000380)={0x0, 0x5265, 0x2, 0xffffffff, 0x11b}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000), &(0x7f00000002c0)=0x0) dup(r4) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f0000000340)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x889c7cb2ceb4d95c, 0x0, 0x0, 0x1}, 0x101) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_RECVMSG={0xa, 0x5, 0x0, r0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/110, 0x6e}, {&(0x7f0000000580)=""/230, 0xe6}, {&(0x7f0000000680)=""/159, 0x9f}, {&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000000740)=""/140, 0x16}], 0x5, &(0x7f0000000880)=""/186, 0xba}, 0x0, 0x40012140, 0x0, {0x3}}, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITE={0x17, 0x4, 0x6000, @fd, 0x7, &(0x7f00000000c0)="7933dd5eb3033f99b70eedfb89863185b0fdeb80dfad79dea96911f3827ce739406636c894ee5f", 0x27, 0x12, 0x1, {0x0, r6}}, 0x9) sendfile(r1, r2, 0x0, 0x100000001) r7 = accept$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000200)=0x1c) copy_file_range(r7, 0x0, r3, &(0x7f0000000240)=0x6, 0x8, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r0, 0x0) 17:20:21 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 17:20:21 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 14) 17:20:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x300000000000000) 17:20:21 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x101, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:20:21 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x1, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:20:21 executing program 1: semget$private(0x0, 0x4, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4317, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0x4, 0x82b4d8da1ae7c66c}], 0x1) r0 = semget$private(0x0, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) semtimedop(r0, &(0x7f0000000100)=[{0x3, 0x52e5, 0x1000}, {0x4, 0x40, 0x1800}, {0x4, 0xffd1}], 0x3, &(0x7f0000000180)={r1, r2+60000000}) r3 = semget$private(0x0, 0x4000, 0x0) semtimedop(r3, &(0x7f0000000000)=[{0x3, 0x0, 0x1000}, {0x1, 0x7fff, 0x1000}, {0x6, 0x2, 0x800}, {0x3, 0xff00}, {0x4, 0x6468}, {0x0, 0x5, 0x1000}, {0x3, 0x4, 0x1800}, {0x3, 0x9, 0x1800}], 0x8, &(0x7f0000000040)) semctl$SEM_STAT_ANY(r3, 0x2, 0x14, &(0x7f00000010c0)=""/79) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = semget$private(0x0, 0x6, 0x0) r5 = semget(0x1, 0x4, 0x189) semtimedop(r5, &(0x7f00000001c0)=[{0x0, 0x7}, {0x0, 0x42f7, 0x800}, {0x3, 0x9a5}, {0x2, 0x101, 0x1000}, {0x0, 0x7, 0x1000}, {0x3, 0x6, 0x1800}], 0x6, &(0x7f0000000200)={0x0, 0x3938700}) semctl$SEM_STAT_ANY(r5, 0x4, 0x14, &(0x7f00000001c0)) semop(r4, &(0x7f00000000c0)=[{0x3, 0x0, 0x1800}, {}, {0x2, 0x8, 0x800}, {0x4}], 0x4) semctl$SEM_INFO(r4, 0x5, 0x13, &(0x7f0000000080)=""/101) unshare(0x48020200) [ 1564.974704] audit: type=1326 audit(1761153621.752:4274): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4f9ca6ea04 code=0x7ffc0000 [ 1564.980947] audit: type=1326 audit(1761153621.752:4275): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f4f9ca6e5ff code=0x7ffc0000 [ 1564.993853] audit: type=1326 audit(1761153621.752:4276): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1565.011901] audit: type=1326 audit(1761153621.830:4277): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f4f9cabbad7 code=0x7ffc0000 [ 1565.015294] audit: type=1326 audit(1761153621.834:4278): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1565.028808] audit: type=1326 audit(1761153621.846:4279): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1565.047319] audit: type=1326 audit(1761153621.846:4280): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9825 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7f4f9ca6eab7 code=0x7ffc0000 [ 1565.075822] FAULT_INJECTION: forcing a failure. [ 1565.075822] name failslab, interval 1, probability 0, space 0, times 0 [ 1565.078405] CPU: 1 PID: 9831 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1565.079924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1565.081769] Call Trace: [ 1565.082356] dump_stack+0x107/0x167 [ 1565.083164] should_fail.cold+0x5/0xa [ 1565.084009] ? shmem_alloc_inode+0x18/0x40 [ 1565.084956] should_failslab+0x5/0x20 [ 1565.085796] kmem_cache_alloc+0x5b/0x310 [ 1565.086694] ? shmem_destroy_inode+0x70/0x70 [ 1565.087664] shmem_alloc_inode+0x18/0x40 [ 1565.088567] ? shmem_destroy_inode+0x70/0x70 [ 1565.089537] alloc_inode+0x63/0x240 [ 1565.090338] new_inode+0x23/0x250 [ 1565.091109] shmem_get_inode+0x15e/0xbc0 [ 1565.092011] __shmem_file_setup+0xb8/0x320 [ 1565.092948] ? _copy_from_user+0xfb/0x1b0 [ 1565.093859] __do_sys_memfd_create+0x275/0x450 [ 1565.094864] ? memfd_file_seals_ptr+0x170/0x170 [ 1565.095883] ? __secure_computing+0x199/0x2f0 [ 1565.096884] do_syscall_64+0x33/0x40 [ 1565.097699] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1565.098817] RIP: 0033:0x7f8028ff5b19 [ 1565.099632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1565.103655] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1565.105321] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1565.106867] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1565.108416] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1565.109972] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1565.111519] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:20:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x19da}) 17:20:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0xfdfdffff00000000) 17:20:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 11) 17:20:35 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x0, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1579.003284] kauditd_printk_skb: 18 callbacks suppressed [ 1579.003296] audit: type=1326 audit(1761153635.821:4299): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9858 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1579.008949] audit: type=1326 audit(1761153635.827:4300): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9853 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1579.013706] audit: type=1326 audit(1761153635.827:4301): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9853 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1579.032435] FAULT_INJECTION: forcing a failure. [ 1579.032435] name failslab, interval 1, probability 0, space 0, times 0 [ 1579.034118] CPU: 0 PID: 9859 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1579.035074] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1579.036260] Call Trace: [ 1579.036642] dump_stack+0x107/0x167 [ 1579.037166] should_fail.cold+0x5/0xa [ 1579.037728] ? create_object.isra.0+0x3a/0xa30 [ 1579.037980] FAULT_INJECTION: forcing a failure. [ 1579.037980] name failslab, interval 1, probability 0, space 0, times 0 [ 1579.038362] should_failslab+0x5/0x20 [ 1579.038386] kmem_cache_alloc+0x5b/0x310 [ 1579.042332] create_object.isra.0+0x3a/0xa30 [ 1579.042970] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1579.043681] kmem_cache_alloc+0x159/0x310 [ 1579.044266] ? shmem_destroy_inode+0x70/0x70 [ 1579.044897] shmem_alloc_inode+0x18/0x40 [ 1579.045467] ? shmem_destroy_inode+0x70/0x70 [ 1579.046087] alloc_inode+0x63/0x240 [ 1579.046593] new_inode+0x23/0x250 [ 1579.047082] shmem_get_inode+0x15e/0xbc0 [ 1579.047651] __shmem_file_setup+0xb8/0x320 [ 1579.048232] ? _copy_from_user+0xfb/0x1b0 [ 1579.048830] __do_sys_memfd_create+0x275/0x450 [ 1579.049459] ? memfd_file_seals_ptr+0x170/0x170 [ 1579.050112] ? __secure_computing+0x199/0x2f0 [ 1579.050755] do_syscall_64+0x33/0x40 [ 1579.051267] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1579.051981] RIP: 0033:0x7f8028ff5b19 [ 1579.052496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1579.055103] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1579.056175] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1579.057183] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1579.058184] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1579.059167] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1579.060162] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1579.061242] CPU: 1 PID: 9855 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1579.062782] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1579.064620] Call Trace: [ 1579.065216] dump_stack+0x107/0x167 [ 1579.065603] audit: type=1326 audit(1761153635.827:4302): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9853 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1579.066028] should_fail.cold+0x5/0xa [ 1579.066056] ? __do_sys_memfd_create+0xfb/0x450 [ 1579.071381] should_failslab+0x5/0x20 17:20:35 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 15) 17:20:35 executing program 1: r0 = syz_io_uring_setup(0x5e85, &(0x7f0000000180)={0x0, 0x9947}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)) syz_io_uring_setup(0x1c28, &(0x7f00000002c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/fscaps', 0x0, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x48001) io_uring_enter(r3, 0x1748, 0x6b0f, 0x2, &(0x7f0000000240)={[0x9]}, 0x8) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='net_cls.classid\x00', 0x2, 0x0) 17:20:35 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0x0, 0xee01}, {@in=@local}, @in=@private, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_PAN_ID={0x6}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0xffff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_PAN_ID={0x6, 0x9, 0xffff}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x50}, 0x8000) 17:20:35 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) [ 1579.072416] __kmalloc+0x72/0x390 [ 1579.073211] __do_sys_memfd_create+0xfb/0x450 [ 1579.074452] ? ksys_write+0x1a9/0x260 [ 1579.075318] ? memfd_file_seals_ptr+0x170/0x170 [ 1579.076460] ? __secure_computing+0x199/0x2f0 [ 1579.077367] audit: type=1326 audit(1761153635.827:4303): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9853 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1579.077673] do_syscall_64+0x33/0x40 [ 1579.077697] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1579.082913] RIP: 0033:0x7f4f9cabbb19 [ 1579.083909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1579.088757] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1579.090745] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1579.092367] audit: type=1326 audit(1761153635.831:4304): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9858 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1579.092513] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1579.092525] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1579.092536] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1579.092547] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1579.101932] audit: type=1326 audit(1761153635.831:4305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9858 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1579.109230] audit: type=1326 audit(1761153635.831:4306): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9858 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 [ 1579.113755] audit: type=1326 audit(1761153635.850:4307): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9858 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8028fa85ff code=0x7ffc0000 [ 1579.119584] audit: type=1326 audit(1761153635.850:4308): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9858 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:20:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$VT_RELDISP(r1, 0x5605) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioctl$TCGETS(r1, 0x5401, &(0x7f00000000c0)) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000100), &(0x7f0000000140)=@v1={0x2, "e61125034a9e73"}, 0x8, 0x5) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x9, &(0x7f0000000180)=[{0xcd, 0x20, 0x0, 0xd6}, {0x400, 0x8, 0x20, 0x4}, {0x1, 0x81, 0xc0}, {0x0, 0x7, 0xff, 0x6}, {0x2, 0x8, 0x6, 0x8}, {0x20, 0x2, 0xdc, 0x8}, {0x5, 0x8a, 0x81, 0xc5e}, {0x6, 0x40, 0x3f, 0x2}, {0x8001, 0x1f, 0x8, 0x9}]}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000240)={0x0, 0x6, [0xaa, 0x4, 0xfff, 0xffffffff, 0x1ff]}) 17:20:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 16) [ 1579.216001] FAULT_INJECTION: forcing a failure. [ 1579.216001] name failslab, interval 1, probability 0, space 0, times 0 [ 1579.217641] CPU: 0 PID: 9880 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1579.218545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1579.219620] Call Trace: [ 1579.219968] dump_stack+0x107/0x167 [ 1579.220439] should_fail.cold+0x5/0xa [ 1579.220946] ? create_object.isra.0+0x3a/0xa30 [ 1579.221542] should_failslab+0x5/0x20 [ 1579.222043] kmem_cache_alloc+0x5b/0x310 [ 1579.222571] create_object.isra.0+0x3a/0xa30 [ 1579.223165] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1579.223831] kmem_cache_alloc+0x159/0x310 [ 1579.224371] ? shmem_destroy_inode+0x70/0x70 [ 1579.224957] shmem_alloc_inode+0x18/0x40 [ 1579.225479] ? shmem_destroy_inode+0x70/0x70 [ 1579.226051] alloc_inode+0x63/0x240 [ 1579.226517] new_inode+0x23/0x250 [ 1579.226975] shmem_get_inode+0x15e/0xbc0 [ 1579.227514] __shmem_file_setup+0xb8/0x320 [ 1579.228058] ? _copy_from_user+0xfb/0x1b0 [ 1579.228596] __do_sys_memfd_create+0x275/0x450 [ 1579.229188] ? memfd_file_seals_ptr+0x170/0x170 [ 1579.229802] ? __secure_computing+0x199/0x2f0 [ 1579.230393] do_syscall_64+0x33/0x40 [ 1579.230871] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1579.231529] RIP: 0033:0x7f8028ff5b19 [ 1579.232008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1579.234399] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1579.235371] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1579.236294] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1579.237230] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1579.238151] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1579.239064] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1579.290944] FAULT_INJECTION: forcing a failure. [ 1579.290944] name failslab, interval 1, probability 0, space 0, times 0 [ 1579.292626] CPU: 0 PID: 9885 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1579.293483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1579.294518] Call Trace: [ 1579.294876] dump_stack+0x107/0x167 [ 1579.295355] should_fail.cold+0x5/0xa [ 1579.295852] ? __do_sys_memfd_create+0xfb/0x450 [ 1579.296442] should_failslab+0x5/0x20 [ 1579.296950] __kmalloc+0x72/0x390 [ 1579.297383] __do_sys_memfd_create+0xfb/0x450 [ 1579.297950] ? ksys_write+0x1a9/0x260 [ 1579.298538] ? memfd_file_seals_ptr+0x170/0x170 17:20:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0xda19}) 17:20:36 executing program 6: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000005c0)=ANY=[]) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="240000001000010000000000000000960000090005000000000000000500008048000000"], 0x24}}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000680)=ANY=[@ANYBLOB="010000", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c653000b48ea56a6b493cb8634727dc7cbbe2dc472ef0d9c090c9991e26be1c3d9fd079f793efc66a713271a2855e89970c24f4262c065543f19143269ee8cc1d3c9c8ac475bc7a3024f713bff13f673937bcaddba5642c92dbdc0d80482b54030ece38e1cf1876d51809826143d8f8776c74fdc425daae2db1d89475e19a8dc9a5933ce331dd68d8eeeb6d4a08efc281862c2579bb81fdb2ff74d6899145972778e23f9e9d8112162745ef852cae5ff53975b308ab5ef28c64c5f7845fa08631689c33b1980a1f73323e439d2a87e3f33e71cc66"]) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000500)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x5008c00c}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x3fb, 0x0, 0x70bd2b, 0x25dfdbfc, "", ["", "", "", "", ""]}, 0x10}}, 0x8804) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000400), &(0x7f0000000440)=0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x80202, 0x100) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000540)={0x8, 'veth0_macvtap\x00', {'dummy0\x00'}, 0xfff9}) r5 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) pwritev(r5, &(0x7f0000000100)=[{&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000000040)}, {&(0x7f0000001780)="c7b81ab35c85a43d1600ead654eab3788279fab223ed87dc0571d056ecbb2f482fb9f9e845585dc579bf29de4d155c44d121d873e4e568581ac3b60ef4bd13544b7472dc7cabfdf93681fb9eb9a2034f0e8ae9ffc3e0169b70334f1e9dfdf49658d901c9e881994c6f40b40e65abe68aa582b1bad55ef004a158490ff34f51b6876fe43522c1b43a5b1303bdff2454954fb9e1ac63509821cfc31ba1915a27fb179228f3f05e035e1092602b83480b5752986b599420ed006ab45e435671ae8d66893932841d2b3a8b28479d3ba411ae7b", 0xd1}, {&(0x7f0000001880)="40d5b117980aa5ecf16fc399f8823259956414890aad8ced91febca5b7fca2c4b0672f3927ac8ab2acff01f32d7d287a9f97af379419ba66c9a283023e87274c450e61aef54db0d3204f0ca98931702aa46e07b10ade7e191d159b49951f36e673acfa4a3ec56a13f5446c615482a03a9f7e5cf63f1dadd5fb6f90c498105c4a195805c4476c98ccbc651c56e56d0d0f6c3e28133b8e67d83bd37bda7d2203bbc77f66528d6198b987759aa38250935d141a1006afbd545851621211d5ec23220e70d2b5c9ea6f2c49178adcb94cc48c7a76f0d9e0770f7da31bb651574f23d6f9f8fc300f7c0ad3", 0xe8}], 0x4, 0x7, 0x1) syz_80211_join_ibss(&(0x7f0000000180)='wlan1\x00', &(0x7f00000001c0)=@default_ibss_ssid, 0x6, 0x0) [ 1579.299416] ? __secure_computing+0x199/0x2f0 [ 1579.300027] do_syscall_64+0x33/0x40 [ 1579.300500] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1579.301141] RIP: 0033:0x7f4f9cabbb19 [ 1579.301602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1579.303872] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1579.304819] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1579.305727] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1579.306615] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1579.307505] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 17:20:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 12) [ 1579.308386] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:20:36 executing program 4: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x200, 0x1}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005700)=[{{&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/90, 0x5a}, {&(0x7f0000000140)=""/32, 0x20}, {&(0x7f0000000180)=""/142, 0x8e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/111, 0x6f}, {&(0x7f00000012c0)=""/168, 0xa8}, {&(0x7f0000001380)=""/208, 0xd0}, {&(0x7f0000001480)=""/98, 0x62}, {&(0x7f0000001500)=""/8, 0x8}], 0x9, &(0x7f0000001600)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001700)=""/252, 0xfc}, {&(0x7f0000001800)=""/147, 0x93}, {&(0x7f00000018c0)=""/149, 0x95}], 0x3, &(0x7f00000019c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000001a40)=@abs, 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000001ac0)=""/222, 0xde}], 0x1}}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001c00)=""/108, 0x6c}, {&(0x7f0000001c80)=""/135, 0x87}, {&(0x7f0000001d40)=""/5, 0x5}], 0x3}}, {{&(0x7f0000001dc0)=@abs, 0x6e, &(0x7f00000050c0)=[{&(0x7f0000001e40)=""/201, 0xc9}, {&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/38, 0x26}, {&(0x7f0000003f80)=""/114, 0x72}, {&(0x7f0000004000)=""/88, 0x58}, {&(0x7f0000004080)=""/38, 0x26}, {&(0x7f00000040c0)=""/4096, 0x1000}], 0x8, &(0x7f0000005140)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000005200), 0x6e, &(0x7f0000005380)=[{&(0x7f0000005280)=""/40, 0x28}, {&(0x7f00000052c0)=""/169, 0xa9}], 0x2, &(0x7f00000053c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}}, {{&(0x7f0000005480), 0x6e, &(0x7f0000005580)=[{&(0x7f0000005500)=""/67, 0x43}], 0x1, &(0x7f00000055c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}}], 0x7, 0x40008062, &(0x7f00000058c0)) ioctl$TCSBRKP(r0, 0x5425, 0x1ff) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) mount$9p_fd(0x0, &(0x7f0000005900)='./file0\x00', &(0x7f0000005940), 0x1040022, &(0x7f0000005980)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}, {@afid={'afid', 0x3d, 0x2}}, {@cache_none}, {@dfltgid={'dfltgid', 0x3d, r1}}], [{@seclabel}]}}) [ 1579.360104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 17:20:36 executing program 4: ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000080)="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") syz_open_dev$tty1(0xc, 0x4, 0x4) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) readv(r1, &(0x7f0000001300)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/132, 0x84}, {&(0x7f0000001240)=""/77, 0x4d}, {&(0x7f00000012c0)}], 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x7, 0x2) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)={0x0, 0x9}) ioctl$TCXONC(r0, 0x540a, 0x0) 17:20:36 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 13) [ 1579.399367] FAULT_INJECTION: forcing a failure. [ 1579.399367] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1579.400951] CPU: 0 PID: 9896 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1579.401753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1579.402729] Call Trace: [ 1579.403044] dump_stack+0x107/0x167 [ 1579.403477] should_fail.cold+0x5/0xa [ 1579.403947] _copy_from_user+0x2e/0x1b0 [ 1579.404418] __do_sys_memfd_create+0x16d/0x450 [ 1579.404989] ? memfd_file_seals_ptr+0x170/0x170 [ 1579.405549] ? __secure_computing+0x199/0x2f0 [ 1579.406095] do_syscall_64+0x33/0x40 [ 1579.406543] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1579.407163] RIP: 0033:0x7f4f9cabbb19 [ 1579.407618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1579.409848] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1579.410744] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1579.411582] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1579.412417] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1579.413256] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1579.414095] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1579.427908] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1579.429904] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1579.432896] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1579.467435] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 17:20:36 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 17) [ 1579.497977] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1579.498929] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1579.499916] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1579.524785] FAULT_INJECTION: forcing a failure. [ 1579.524785] name failslab, interval 1, probability 0, space 0, times 0 [ 1579.527387] CPU: 1 PID: 9899 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1579.528887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1579.530693] Call Trace: [ 1579.531274] dump_stack+0x107/0x167 [ 1579.532070] should_fail.cold+0x5/0xa [ 1579.532910] ? create_object.isra.0+0x3a/0xa30 [ 1579.533891] should_failslab+0x5/0x20 [ 1579.534712] kmem_cache_alloc+0x5b/0x310 [ 1579.535586] create_object.isra.0+0x3a/0xa30 [ 1579.536522] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1579.537620] kmem_cache_alloc+0x159/0x310 [ 1579.538510] security_inode_alloc+0x34/0x160 [ 1579.539437] inode_init_always+0xa4e/0xd10 [ 1579.540345] ? shmem_destroy_inode+0x70/0x70 [ 1579.541301] alloc_inode+0x84/0x240 [ 1579.542083] new_inode+0x23/0x250 [ 1579.542829] shmem_get_inode+0x15e/0xbc0 [ 1579.543709] __shmem_file_setup+0xb8/0x320 [ 1579.544621] ? _copy_from_user+0xfb/0x1b0 [ 1579.545740] __do_sys_memfd_create+0x275/0x450 [ 1579.546834] ? memfd_file_seals_ptr+0x170/0x170 [ 1579.547828] ? __secure_computing+0x199/0x2f0 [ 1579.548801] do_syscall_64+0x33/0x40 [ 1579.549599] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1579.550696] RIP: 0033:0x7f8028ff5b19 [ 1579.551496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1579.555445] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1579.557087] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1579.558615] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1579.560140] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1579.561671] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1579.563194] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:20:49 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x4) dup2(r0, 0xffffffffffffffff) r1 = msgget$private(0x0, 0x20) msgrcv(r1, &(0x7f0000000000)={0x0, ""/186}, 0xc2, 0x0, 0x3000) mkdir(&(0x7f0000000100)='./file1\x00', 0x61) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r2, 0x540a, 0x0) 17:20:49 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/warn_count', 0x1, 0x16) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x4, 0x8200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$inet6(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0xff, 0x1, 0xe8, 0x59, 0x0, 0x4, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffb, 0x0, @perf_config_ext={0x80000000, 0x9}, 0x9500, 0x4c, 0x8, 0x3, 0x1, 0x240000, 0x7, 0x0, 0x7f00000, 0x0, 0xec}, r2, 0x2, r4, 0xb) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/209, 0xd1}], 0x1, 0x1, 0x1000) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000080)=""/94) 17:20:49 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:20:49 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$VT_RELDISP(r1, 0x5605) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioctl$TCGETS(r1, 0x5401, &(0x7f00000000c0)) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000040)) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000100), &(0x7f0000000140)=@v1={0x2, "e61125034a9e73"}, 0x8, 0x5) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x9, &(0x7f0000000180)=[{0xcd, 0x20, 0x0, 0xd6}, {0x400, 0x8, 0x20, 0x4}, {0x1, 0x81, 0xc0}, {0x0, 0x7, 0xff, 0x6}, {0x2, 0x8, 0x6, 0x8}, {0x20, 0x2, 0xdc, 0x8}, {0x5, 0x8a, 0x81, 0xc5e}, {0x6, 0x40, 0x3f, 0x2}, {0x8001, 0x1f, 0x8, 0x9}]}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000240)={0x0, 0x6, [0xaa, 0x4, 0xfff, 0xffffffff, 0x1ff]}) 17:20:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 14) 17:20:49 executing program 6: ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000080)="8fd228835520701204fa859be3b6432a52f5008b4faabc56cfc963859eeaa21dcbd3039aef1aef09fb03c5e62053425ea2abbf4d4b59e62f8bc40338baaf01ee5b94ad3aa1e774e406d91dca3ca37bfff273f725ad7e8f5db187ab04f523bde93501f9ab8d85fc3a6f1a2066443f32ad5d6418e8e39edaa23594ef7300262c46277540687671eadae65c1ff0de384013987a385f5e581e263c17742ba92445228b047f1cf119bca175b909ad381b65cb8222f848c5a343741220b3ba3e46558a788b0121d822ef68633499a6965862150165660f6902acf6fde6e651a329544bb5c02dc58eb3d221fad98d73b4c3c28ad35650580eb1614c154f439104fd21eb") syz_open_dev$tty1(0xc, 0x4, 0x4) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000080)='./file0\x00', 0x4) readv(r1, &(0x7f0000001300)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/132, 0x84}, {&(0x7f0000001240)=""/77, 0x4d}, {&(0x7f00000012c0)}], 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x7, 0x2) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)={0x0, 0x9}) ioctl$TCXONC(r0, 0x540a, 0x0) 17:20:49 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 18) 17:20:49 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x0, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1593.200566] kauditd_printk_skb: 79 callbacks suppressed [ 1593.200576] audit: type=1326 audit(1761153650.018:4388): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9912 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1593.205984] audit: type=1326 audit(1761153650.023:4389): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9912 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1593.211013] FAULT_INJECTION: forcing a failure. [ 1593.211013] name failslab, interval 1, probability 0, space 0, times 0 [ 1593.212403] CPU: 1 PID: 9917 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1593.213190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1593.214138] Call Trace: [ 1593.214445] dump_stack+0x107/0x167 [ 1593.214864] should_fail.cold+0x5/0xa [ 1593.215306] ? shmem_alloc_inode+0x18/0x40 [ 1593.215801] should_failslab+0x5/0x20 [ 1593.216243] kmem_cache_alloc+0x5b/0x310 [ 1593.216709] ? shmem_destroy_inode+0x70/0x70 [ 1593.217230] shmem_alloc_inode+0x18/0x40 [ 1593.217694] ? shmem_destroy_inode+0x70/0x70 [ 1593.218193] alloc_inode+0x63/0x240 [ 1593.218610] new_inode+0x23/0x250 [ 1593.219009] shmem_get_inode+0x15e/0xbc0 [ 1593.219480] __shmem_file_setup+0xb8/0x320 [ 1593.219968] ? _copy_from_user+0xfb/0x1b0 [ 1593.220444] __do_sys_memfd_create+0x275/0x450 [ 1593.220975] ? memfd_file_seals_ptr+0x170/0x170 [ 1593.221510] ? __secure_computing+0x199/0x2f0 [ 1593.222027] do_syscall_64+0x33/0x40 [ 1593.222457] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1593.223047] RIP: 0033:0x7f4f9cabbb19 [ 1593.223478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1593.225597] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1593.226467] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1593.227286] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1593.228106] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1593.228931] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1593.229747] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1593.233792] audit: type=1326 audit(1761153650.023:4390): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9912 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1593.242987] audit: type=1326 audit(1761153650.024:4391): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9912 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4f9ca6ea04 code=0x7ffc0000 17:20:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = getpgrp(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x401, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000200)="1951b0640f7fb2dbafd752d7bc39109e672a8bb03fcee5decdaa6d34d073098ee908161b954f67161c9bb4fea88194900bf0ccfcb9557bdee799267087e8735b4fb9cbec56ab92c3afc5f38441e1b53516a8c0ba71cbe69b031c78d1f0d5b48a30f784cb524d8472740f66ea0d357486be3e56949303d018e66dee3d0b0c84fcc74ba8ffa1523010c55ec33f13afe613ecdfd59b06afb35ec67fe87f3f4011acb1331c43ac847f376285db282a65", 0xae, 0xfffffffffffffffb}, {&(0x7f00000000c0)="6d1b70652eca328b1dec7807da4d4d3dd857a856aa8b776595ac4bb93f837d9be9f38d2305bceb89e85773ded2560b85800f30a3fef894657ec1d8e56db68026b64d7accc54a451f832c7289dc533c", 0x4f, 0x3bb2}, {&(0x7f00000002c0)="f96000dceb95227f59d1fc9995c7706af5d016ae69475c6723d33ea1df4194d452f36adbd630db9cd9e1207d8699450253feb8cd59f2b1a388f1d64005f945ebb480eba7bb07cdd782badbc17d26049b296b3954af0d4b982e986ab7e4198435823dbdc861d7ff91bdc0cc5b2954895c22a713536bda9989cc8e60dc22bd692a2a5e4cbbae823108137b00b8e6dd7b6d5d8e8adf046b4dc9eafb31bc44451e16590cd0558e2315", 0xa7, 0x9}, {&(0x7f0000000180), 0x0, 0x4}, {&(0x7f0000000380)="00e37ad21dfcca1f56", 0x9, 0x3}], 0x0, &(0x7f0000000440)={[{@lazytime}, {@sb={'sb', 0x3d, 0xfffffffffffff3bf}}, {@grpquota}, {@nodiscard}, {@mblk_io_submit}], [{@subj_role={'subj_role', 0x3d, '(/(\xf4\'/.'}}, {@smackfsroot={'smackfsroot', 0x3d, '-}+$'}}]}) [ 1593.256736] audit: type=1326 audit(1761153650.027:4392): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9912 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f4f9ca6e5ff code=0x7ffc0000 [ 1593.259776] FAULT_INJECTION: forcing a failure. [ 1593.259776] name failslab, interval 1, probability 0, space 0, times 0 [ 1593.262900] CPU: 0 PID: 9921 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1593.264506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1593.266415] Call Trace: [ 1593.266547] audit: type=1326 audit(1761153650.029:4393): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9912 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1593.267024] dump_stack+0x107/0x167 [ 1593.270228] should_fail.cold+0x5/0xa [ 1593.271099] ? __d_alloc+0x2a/0x990 [ 1593.271923] should_failslab+0x5/0x20 [ 1593.272789] kmem_cache_alloc+0x5b/0x310 [ 1593.273725] ? trace_hardirqs_on+0x5b/0x180 [ 1593.274713] __d_alloc+0x2a/0x990 [ 1593.275508] d_alloc_pseudo+0x19/0x70 [ 1593.276375] alloc_file_pseudo+0xce/0x250 [ 1593.277326] ? alloc_file+0x5a0/0x5a0 [ 1593.278201] ? shmem_get_inode+0x55c/0xbc0 [ 1593.279178] __shmem_file_setup+0x144/0x320 [ 1593.280168] ? _copy_from_user+0xfb/0x1b0 [ 1593.281131] __do_sys_memfd_create+0x275/0x450 [ 1593.282176] ? memfd_file_seals_ptr+0x170/0x170 [ 1593.283243] ? __secure_computing+0x199/0x2f0 [ 1593.284282] do_syscall_64+0x33/0x40 [ 1593.285145] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1593.286314] RIP: 0033:0x7f8028ff5b19 [ 1593.287164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1593.291367] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1593.293100] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1593.294735] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1593.296364] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1593.297993] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1593.299629] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1593.301432] audit: type=1326 audit(1761153650.055:4394): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9913 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1593.310694] audit: type=1326 audit(1761153650.056:4395): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9913 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1593.314736] audit: type=1326 audit(1761153650.058:4396): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9913 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1593.322134] audit: type=1326 audit(1761153650.066:4397): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9913 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 17:20:50 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x0, 0x20, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:20:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 15) 17:20:50 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31363931393939333900"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf7e49a1d95947318303ae70299e26a0010040000c00000000000000e0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004600000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000e0f4655fe0f4655fe0f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011700)="2000000098cfbf5498cfbf5400000000e0f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000030000000", 0x40, 0x2200}, {&(0x7f0000011900)="20000000000000000000000000000000e0f4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011a00)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2300}, {&(0x7f0000011b00)="20000000000000000000000000000000e0f4655f00"/32, 0x20, 0x2380}, {&(0x7f0000011c00)="c041000000400000e0f4655fe0f4655fe0f4655f00000000000002004000000000000800000000000af301000400000000000000000000000800000020000000", 0x40, 0x2a00}, {&(0x7f0000011d00)="20000000000000000000000000000000e0f4655f00"/32, 0x20, 0x2a80}, {&(0x7f0000011e00)="ed41000000080000e0f4655fe0f4655fe0f4655f00000000000002004000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000904c48a10000000000000000000000000000000000000000000000002000000098cfbf5498cfbf5498cfbf54e0f4655f98cfbf540000000000000000", 0xa0, 0x2b00}, {&(0x7f0000011f00)="ed8100001a040000e0f4655fe0f4655fe0f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000007e8b766c0000000000000000000000000000000000000000000000002000000098cfbf5498cfbf5498cfbf54e0f4655f98cfbf540000000000000000", 0xa0, 0x2c00}, {&(0x7f0000012000)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3136393139393933392f66696c65302f66696c6530000000000000000000000000000000000000000000003e5efe8c0000000000000000000000000000000000000000000000002000000098cfbf5498cfbf5498cfbf54e0f4655f98cfbf540000000000000000", 0xa0, 0x2d00}, {&(0x7f0000012100)="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", 0x1a0, 0x2e00}, {&(0x7f0000012300)="ed81000064000000e0f4655fe0f4655fe0f4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000e350ad400000000000000000000000000000000000000000000000002000000098cfbf5498cfbf5498cfbf54e0f4655f98cfbf540000000000000000", 0xa0, 0x3000}, {&(0x7f0000012400)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012500)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x10000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000000080)="00000000000800000000000000000000000000000000000000a73087f58781b1998c4114777f45cd00", 0x29, 0x11800}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x19400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0xc3}, {&(0x7f0000013400)="0200"/32, 0x20, 0x20400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x21400}, {&(0x7f0000013900)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x28000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}, {&(0x7f0000013f00)='syzkallers\x00'/32, 0x20, 0x38000}, {&(0x7f0000014000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x48000}], 0x0, &(0x7f0000014100)) 17:20:50 executing program 6: syz_usb_connect$cdc_ecm(0x4, 0x0, 0x0, 0x0) timer_delete(0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x1}, &(0x7f0000000240)=0x0) timer_gettime(r0, &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r2 = syz_io_uring_setup(0x19b5, &(0x7f0000003480)={0x0, 0x0, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000240)=0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="c3ddb880551fd1e9931033dff1891d267b42885d70f5a3751a7d8f1881b62d661ef832a18c62984bf70db56bf48b4a0060f93e15fff99c28a7fac7731185e5082a915fd8cef67dc9365d96e9d07be5a92c587a34a854cdd66c41a965d28ec01079b400c993c98ba2da291979f8722fbbaaa099af60c84e3dc6c557f2b885d43432cd139738ef6d0594b5142e7a7d60c577075c3814ecab579546a2480204b9a5cec3cb9db7e3fe007dcf0fefc5e305321fc7e5b02f67f851ed66b6af64d5fb8732acf1ebd07c77140f0802aa5c7b57916ff1"], 0xc1) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_CLOSE, 0x0) io_uring_enter(r2, 0x58ab, 0x0, 0x0, 0x0, 0x0) timer_gettime(r1, &(0x7f00000002c0)) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)={0xaa5, 0x9, 0x9, 0xfffffffd, 0x11b2}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000140)={@private0, r6}, 0x14) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000280)='/sys/bus/machinecheck', 0x6281, 0x19) timer_delete(r1) timer_delete(r0) 17:20:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x400}) [ 1593.467334] FAULT_INJECTION: forcing a failure. [ 1593.467334] name failslab, interval 1, probability 0, space 0, times 0 17:20:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) ioctl$TIOCNXCL(r0, 0x540d) [ 1593.470183] CPU: 0 PID: 9940 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1593.471883] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1593.473794] Call Trace: [ 1593.474400] dump_stack+0x107/0x167 [ 1593.475235] should_fail.cold+0x5/0xa [ 1593.476113] ? shmem_alloc_inode+0x18/0x40 [ 1593.477094] should_failslab+0x5/0x20 [ 1593.477964] kmem_cache_alloc+0x5b/0x310 [ 1593.478896] ? shmem_destroy_inode+0x70/0x70 [ 1593.479898] shmem_alloc_inode+0x18/0x40 [ 1593.480823] ? shmem_destroy_inode+0x70/0x70 [ 1593.481829] alloc_inode+0x63/0x240 [ 1593.482654] new_inode+0x23/0x250 [ 1593.483449] shmem_get_inode+0x15e/0xbc0 [ 1593.484384] __shmem_file_setup+0xb8/0x320 [ 1593.485399] ? _copy_from_user+0xfb/0x1b0 [ 1593.486361] __do_sys_memfd_create+0x275/0x450 [ 1593.486385] ? memfd_file_seals_ptr+0x170/0x170 17:20:50 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 19) [ 1593.486406] ? __secure_computing+0x199/0x2f0 [ 1593.486435] do_syscall_64+0x33/0x40 [ 1593.486456] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1593.486470] RIP: 0033:0x7f4f9cabbb19 [ 1593.486491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1593.486502] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1593.486525] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1593.486537] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1593.486549] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1593.486560] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1593.486572] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1593.585277] FAULT_INJECTION: forcing a failure. [ 1593.585277] name failslab, interval 1, probability 0, space 0, times 0 [ 1593.588106] CPU: 0 PID: 9948 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1593.589684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1593.591582] Call Trace: [ 1593.592188] dump_stack+0x107/0x167 [ 1593.593032] should_fail.cold+0x5/0xa [ 1593.593905] ? create_object.isra.0+0x3a/0xa30 [ 1593.594947] should_failslab+0x5/0x20 [ 1593.595816] kmem_cache_alloc+0x5b/0x310 [ 1593.596748] create_object.isra.0+0x3a/0xa30 [ 1593.597754] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1593.598925] kmem_cache_alloc+0x159/0x310 [ 1593.599869] ? trace_hardirqs_on+0x5b/0x180 [ 1593.600858] __d_alloc+0x2a/0x990 [ 1593.601673] d_alloc_pseudo+0x19/0x70 [ 1593.602548] alloc_file_pseudo+0xce/0x250 [ 1593.603493] ? alloc_file+0x5a0/0x5a0 [ 1593.604464] ? shmem_get_inode+0x55c/0xbc0 [ 1593.605446] __shmem_file_setup+0x144/0x320 [ 1593.606440] ? _copy_from_user+0xfb/0x1b0 [ 1593.607390] __do_sys_memfd_create+0x275/0x450 [ 1593.608429] ? memfd_file_seals_ptr+0x170/0x170 [ 1593.609500] ? __secure_computing+0x199/0x2f0 [ 1593.610533] do_syscall_64+0x33/0x40 [ 1593.611382] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1593.612547] RIP: 0033:0x7f8028ff5b19 [ 1593.613409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1593.617601] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1593.619346] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1593.620982] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1593.622602] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1593.624227] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1593.625860] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:21:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_pts(r0, 0x808c0) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000000)) ioctl$KDSKBLED(r1, 0x4b65, 0x1f) ioctl$TCXONC(r0, 0x540a, 0x0) 17:21:05 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}, 0x10) 17:21:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x20) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x0, 0x6}) 17:21:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 16) 17:21:05 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 20) 17:21:05 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x126) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:21:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x1a, 0x0, 0x7fffffff}) syz_open_dev$vcsu(0x0, 0x0, 0x8000) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x66}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x40}}]}, 0x13c}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') renameat(r5, &(0x7f0000000080)='./mnt\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./mnt\x00') r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = pidfd_getfd(0xffffffffffffffff, r6, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x0, [{}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xd4, "544d056968f26f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f0000000340)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {0x0, r14}], 0x5, "b53acec1810ff0"}) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0xdf, 0xff, 0x6, 0x4, 0x0, 0x65, 0x2400, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x9, 0xfeab}, 0x400, 0x2, 0x1, 0x3, 0x8, 0x3ff, 0x2, 0x0, 0x3ff, 0x0, 0x3}, 0x0, 0xf, r6, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055040)={0x1, [{r3}, {}, {0x0, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {r3, r4}, {r2}, {0x0, r4}, {r3}, {r3}, {r3, r4}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {r3}, {}, {}, {0x0, r4}, {}, {r2, r4}, {r2}, {r3}, {r3}, {r2}, {r3, r4}, {r2}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3, r4}, {r3}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {}, {r3}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {0x0, r4}, {r3}, {r2, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {}, {0x0, r4}, {r3, r4}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r2, r4}, {r3, r4}, {}, {r2}, {r3}, {r3}, {0x0, r4}, {}, {}, {r3}, {}, {r3, r4}, {0x0, r4}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {r2, r4}, {r3}, {}, {r3}, {r3}, {r2, r4}, {r2}, {r3, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {0x0, r4}, {r3}, {r2}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {}, {0x0, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {r3, r4}, {r3}, {r3, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {}, {r2, r4}, {r2, r4}, {}, {r3, r4}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3, r4}, {r2}, {}, {r2}, {r2}, {r2, r4}, {r2}, {0x0, r4}, {}, {r2}, {r3, r4}, {}, {}, {r2}, {}, {}, {r2}, {0x0, r4}, {r2}, {}, {}, {r3}, {r3, r4}, {0x0, r4}, {}, {r2}, {0x0, r4}, {}, {0x0, r4}, {r3}, {r2}, {r2}, {r3, r4}, {r3, r4}, {r3, r4}, {r2}, {0x0, r4}, {r3, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {r2}, {r3}, {r2}, {r3, r4}, {r2, r4}, {r2}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {0x0, r4}, {}, {r2, r4}, {r3}, {0x0, r4}, {}, {}, {r3}, {}, {}, {r2, r4}, {r2}, {}, {r2, r4}, {0x0, r4}, {r3}, {}, {r2, r4}, {0x0, r4}, {}, {}, {}, {r2}, {r2}, {}, {}, {}, {}, {r2, r4}, {0x0, r4}, {r2, r4}, {r2}, {0x0, r4}, {r2}, {0x0, r4}, {0x0, r4}, {r2, r4}, {0x0, r4}, {r2}, {r3, r4}, {r3}, {r3}, {r2}, {r3}, {0x0, r15}, {r2, r4}], 0x40, "f1662e234a5d2f"}) r16 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r16, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x66}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x40}}]}, 0x13c}}, 0x0) [ 1608.498647] kauditd_printk_skb: 45 callbacks suppressed [ 1608.498657] audit: type=1326 audit(1761153665.316:4443): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1608.502072] audit: type=1326 audit(1761153665.321:4444): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9954 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1608.504777] audit: type=1326 audit(1761153665.321:4445): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9954 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 17:21:05 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1608.526240] audit: type=1326 audit(1761153665.323:4446): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1608.534180] FAULT_INJECTION: forcing a failure. [ 1608.534180] name failslab, interval 1, probability 0, space 0, times 0 [ 1608.537082] CPU: 0 PID: 9964 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1608.538531] audit: type=1326 audit(1761153665.323:4447): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1608.538742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1608.543071] Call Trace: [ 1608.543686] dump_stack+0x107/0x167 [ 1608.544530] should_fail.cold+0x5/0xa [ 1608.545416] ? __alloc_file+0x21/0x320 [ 1608.546325] should_failslab+0x5/0x20 [ 1608.547207] kmem_cache_alloc+0x5b/0x310 [ 1608.548171] __alloc_file+0x21/0x320 [ 1608.549051] alloc_empty_file+0x6d/0x170 [ 1608.550014] alloc_file+0x5e/0x5a0 [ 1608.550842] alloc_file_pseudo+0x16a/0x250 [ 1608.551344] audit: type=1326 audit(1761153665.332:4448): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9954 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1608.551817] ? alloc_file+0x5a0/0x5a0 [ 1608.551845] ? shmem_get_inode+0x55c/0xbc0 [ 1608.556131] __shmem_file_setup+0x144/0x320 [ 1608.557112] ? _copy_from_user+0xfb/0x1b0 [ 1608.558052] __do_sys_memfd_create+0x275/0x450 [ 1608.558877] audit: type=1326 audit(1761153665.333:4449): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9954 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 [ 1608.559100] ? memfd_file_seals_ptr+0x170/0x170 [ 1608.562564] ? __secure_computing+0x199/0x2f0 [ 1608.563616] do_syscall_64+0x33/0x40 [ 1608.563831] audit: type=1326 audit(1761153665.339:4450): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9958 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4f9ca6ea04 code=0x7ffc0000 [ 1608.564476] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1608.568037] RIP: 0033:0x7f8028ff5b19 [ 1608.568102] audit: type=1326 audit(1761153665.351:4451): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9954 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8028fa85ff code=0x7ffc0000 [ 1608.568893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1608.568909] RSP: 002b:00007f802656af48 EFLAGS: 00000246 [ 1608.572567] audit: type=1326 audit(1761153665.352:4452): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=9954 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1608.575552] ORIG_RAX: 000000000000013f [ 1608.575567] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1608.575580] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1608.575596] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1608.586840] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1608.588488] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:21:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x100000001, 0x0) fcntl$addseals(r0, 0x409, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000080)) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x1de, 0x2, 0x8, 0x3e9e, 0x8b, 0x1}) ioctl$TCXONC(r0, 0x540a, 0x2) [ 1608.604801] FAULT_INJECTION: forcing a failure. [ 1608.604801] name failslab, interval 1, probability 0, space 0, times 0 [ 1608.607646] CPU: 0 PID: 9966 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1608.609238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1608.611155] Call Trace: [ 1608.611762] dump_stack+0x107/0x167 [ 1608.612617] should_fail.cold+0x5/0xa [ 1608.613503] ? security_inode_alloc+0x34/0x160 [ 1608.614561] should_failslab+0x5/0x20 [ 1608.615438] kmem_cache_alloc+0x5b/0x310 [ 1608.616386] security_inode_alloc+0x34/0x160 [ 1608.617413] inode_init_always+0xa4e/0xd10 [ 1608.618387] ? shmem_destroy_inode+0x70/0x70 [ 1608.619402] alloc_inode+0x84/0x240 [ 1608.620242] new_inode+0x23/0x250 [ 1608.621061] shmem_get_inode+0x15e/0xbc0 [ 1608.622029] __shmem_file_setup+0xb8/0x320 [ 1608.623020] ? _copy_from_user+0xfb/0x1b0 [ 1608.623992] __do_sys_memfd_create+0x275/0x450 [ 1608.625096] ? memfd_file_seals_ptr+0x170/0x170 [ 1608.626179] ? __secure_computing+0x199/0x2f0 [ 1608.627222] do_syscall_64+0x33/0x40 [ 1608.628081] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1608.629264] RIP: 0033:0x7f4f9cabbb19 17:21:05 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x52dd, &(0x7f00000001c0)={0x0, 0x770f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000380)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}, 0x2000) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') setresuid(0xffffffffffffffff, r3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r5, &(0x7f00000000c0)={&(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10, 0x0}, 0x8004) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$inet6(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r6, 0x1, 0x0, 0x0) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:21:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0xfffc}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) [ 1608.630128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1608.634551] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1608.634574] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1608.634586] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1608.634598] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1608.634609] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1608.634621] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:21:05 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 17) 17:21:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x9, 0xff, 0x0, 0x81, 0x3}}) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000040)=""/45) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) 17:21:05 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1608.893395] FAULT_INJECTION: forcing a failure. [ 1608.893395] name failslab, interval 1, probability 0, space 0, times 0 [ 1608.894935] CPU: 1 PID: 10003 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1608.895733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1608.896687] Call Trace: [ 1608.897012] dump_stack+0x107/0x167 [ 1608.897449] should_fail.cold+0x5/0xa [ 1608.897897] ? create_object.isra.0+0x3a/0xa30 [ 1608.898424] should_failslab+0x5/0x20 [ 1608.898885] kmem_cache_alloc+0x5b/0x310 [ 1608.898900] create_object.isra.0+0x3a/0xa30 [ 1608.898909] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1608.898922] kmem_cache_alloc+0x159/0x310 [ 1608.898936] security_inode_alloc+0x34/0x160 [ 1608.898948] inode_init_always+0xa4e/0xd10 [ 1608.898958] ? shmem_destroy_inode+0x70/0x70 [ 1608.898969] alloc_inode+0x84/0x240 [ 1608.898979] new_inode+0x23/0x250 [ 1608.898991] shmem_get_inode+0x15e/0xbc0 [ 1608.899007] __shmem_file_setup+0xb8/0x320 [ 1608.899018] ? _copy_from_user+0xfb/0x1b0 [ 1608.899030] __do_sys_memfd_create+0x275/0x450 [ 1608.899041] ? memfd_file_seals_ptr+0x170/0x170 [ 1608.899052] ? __secure_computing+0x199/0x2f0 [ 1608.899067] do_syscall_64+0x33/0x40 [ 1608.899078] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1608.899085] RIP: 0033:0x7f4f9cabbb19 [ 1608.899096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1608.899102] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1608.899113] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1608.899120] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1608.899126] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1608.899132] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1608.899138] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:21:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x0, 0x3, 0x3}) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x2fba, 0x20040) r3 = syz_open_dev$sg(0x0, 0x0, 0x2001) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x84009422, &(0x7f00000004c0)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000d00)="249d566f9b6e45bb8db2f51b9edf49f5451b5812cb12c470b556498a498949884c67780a5e6765fd725c0151dd7b7397fe37c61d174f7fdb61f957e2f29cb127dc339c29cdd0d36098248b32f07fa55ccea92f29982fc8d38b86da3cd66c0801524eca386553ea3ccb55d1d781d374cb68d3554335bc6b") ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f00000008c0)={r4, 0x5, 0x8}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f00000004c0)={0x5, 0x7, {0x43, @usage=0xffff, r4, 0xca, 0x401, 0x6, 0x5, 0x9, 0x0, @usage=0x5c9, 0x0, 0x5094364c, [0x1a0a042f, 0x10000, 0x5, 0x2f200000000, 0x6522, 0x10000]}, {0x6, @usage=0x1, r5, 0x69f, 0xfffffffffffffff8, 0x20, 0xff, 0x554, 0x10, @usage=0x5, 0x8, 0x4, [0x8, 0x9, 0x7, 0x8f, 0x8]}, {0xff, @usage=0x5, 0x0, 0x1, 0x1, 0x80000001, 0x3f, 0x2, 0x15, @usage, 0x8, 0x101, [0x6, 0x9f98, 0x4f70, 0x2, 0xfcc, 0x40]}, {0x8000, 0x9, 0x8}}) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x8000000) r7 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x4, {}, 0x5, 0x3, 0x0, {0x0, r9, r7}}, 0x5) syz_io_uring_submit(r6, 0x0, &(0x7f0000000cc0)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, r9}}, 0x5) ioctl$TIOCSIG(r0, 0x40045436, 0x23) [ 1622.304196] kauditd_printk_skb: 32 callbacks suppressed [ 1622.304207] audit: type=1326 audit(1761153679.123:4485): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10024 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 17:21:19 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 21) 17:21:19 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x100000001, 0x0) fcntl$addseals(r0, 0x409, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000080)) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x1de, 0x2, 0x8, 0x3e9e, 0x8b, 0x1}) ioctl$TCXONC(r0, 0x540a, 0x2) 17:21:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 18) 17:21:19 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:21:19 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) 17:21:19 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x1a, 0x0, 0x7fffffff}) syz_open_dev$vcsu(0x0, 0x0, 0x8000) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x66}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x40}}]}, 0x13c}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)={0x0, ""/256, 0x0, 0x0}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') renameat(r5, &(0x7f0000000080)='./mnt\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./mnt\x00') r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = pidfd_getfd(0xffffffffffffffff, r6, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000002e00)={0x0, [{}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xd4, "544d056968f26f"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f0000000340)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {0x0, r14}], 0x5, "b53acec1810ff0"}) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0xdf, 0xff, 0x6, 0x4, 0x0, 0x65, 0x2400, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x9, 0xfeab}, 0x400, 0x2, 0x1, 0x3, 0x8, 0x3ff, 0x2, 0x0, 0x3ff, 0x0, 0x3}, 0x0, 0xf, r6, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000055040)={0x1, [{r3}, {}, {0x0, r4}, {0x0, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {r3, r4}, {r2}, {0x0, r4}, {r3}, {r3}, {r3, r4}, {r2}, {0x0, r4}, {}, {r2, r4}, {}, {r3}, {}, {}, {0x0, r4}, {}, {r2, r4}, {r2}, {r3}, {r3}, {r2}, {r3, r4}, {r2}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3}, {0x0, r4}, {r3, r4}, {0x0, r4}, {r3, r4}, {r3}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {}, {r3}, {r3, r4}, {}, {r2, r4}, {0x0, r4}, {0x0, r4}, {r3}, {r2, r4}, {r3, r4}, {0x0, r4}, {r2, r4}, {}, {0x0, r4}, {r3, r4}, {}, {r3}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r2, r4}, {r3, r4}, {}, {r2}, {r3}, {r3}, {0x0, r4}, {}, {}, {r3}, {}, {r3, r4}, {0x0, r4}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {r2, r4}, {r3}, {}, {r3}, {r3}, {r2, r4}, {r2}, {r3, r4}, {0x0, r4}, {r3, r4}, {r2, r4}, {r3}, {0x0, r4}, {}, {r2}, {r3}, {r3}, {0x0, r4}, {r3}, {r2}, {}, {0x0, r4}, {0x0, r4}, {}, {r2}, {}, {0x0, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {r3, r4}, {r3}, {r3, r4}, {r3}, {r3}, {0x0, r4}, {0x0, r4}, {}, {r2, r4}, {r2, r4}, {}, {r3, r4}, {0x0, r4}, {0x0, r4}, {r2}, {}, {}, {}, {}, {r3, r4}, {r2}, {}, {r2}, {r2}, {r2, r4}, {r2}, {0x0, r4}, {}, {r2}, {r3, r4}, {}, {}, {r2}, {}, {}, {r2}, {0x0, r4}, {r2}, {}, {}, {r3}, {r3, r4}, {0x0, r4}, {}, {r2}, {0x0, r4}, {}, {0x0, r4}, {r3}, {r2}, {r2}, {r3, r4}, {r3, r4}, {r3, r4}, {r2}, {0x0, r4}, {r3, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {}, {}, {0x0, r4}, {}, {}, {}, {r2}, {r3}, {r2}, {r3, r4}, {r2, r4}, {r2}, {}, {}, {}, {r2}, {r2}, {r2, r4}, {0x0, r4}, {}, {r2, r4}, {r3}, {0x0, r4}, {}, {}, {r3}, {}, {}, {r2, r4}, {r2}, {}, {r2, r4}, {0x0, r4}, {r3}, {}, {r2, r4}, {0x0, r4}, {}, {}, {}, {r2}, {r2}, {}, {}, {}, {}, {r2, r4}, {0x0, r4}, {r2, r4}, {r2}, {0x0, r4}, {r2}, {0x0, r4}, {0x0, r4}, {r2, r4}, {0x0, r4}, {r2}, {r3, r4}, {r3}, {r3}, {r2}, {r3}, {0x0, r15}, {r2, r4}], 0x40, "f1662e234a5d2f"}) r16 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r16, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@updsa={0x13c, 0x1a, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa, 0x4, 0x0, 0x66}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x40}}]}, 0x13c}}, 0x0) 17:21:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000004c0)={0x13b, 0x5, &(0x7f00000000c0)="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"}) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000080)='./file0\x00', 0x4) dup3(r2, r3, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0x9, 0x200, 0x5, 0x8, 0x1f, "187cff4c28eee22aef30a492d759c93b687114", 0xd66, 0x6}) [ 1622.316758] audit: type=1326 audit(1761153679.133:4486): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10024 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1622.324675] audit: type=1326 audit(1761153679.135:4487): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10024 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4f9cabbb19 code=0x7ffc0000 [ 1622.330402] FAULT_INJECTION: forcing a failure. [ 1622.330402] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.331818] CPU: 1 PID: 10039 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1622.332616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.333573] Call Trace: [ 1622.333880] dump_stack+0x107/0x167 [ 1622.334298] should_fail.cold+0x5/0xa [ 1622.334732] ? create_object.isra.0+0x3a/0xa30 [ 1622.335263] should_failslab+0x5/0x20 [ 1622.335698] kmem_cache_alloc+0x5b/0x310 [ 1622.336168] create_object.isra.0+0x3a/0xa30 [ 1622.336672] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1622.337267] kmem_cache_alloc+0x159/0x310 [ 1622.337746] __alloc_file+0x21/0x320 [ 1622.338173] alloc_empty_file+0x6d/0x170 [ 1622.338643] alloc_file+0x5e/0x5a0 [ 1622.339047] alloc_file_pseudo+0x16a/0x250 [ 1622.339541] ? alloc_file+0x5a0/0x5a0 [ 1622.339984] ? shmem_get_inode+0x55c/0xbc0 [ 1622.340476] __shmem_file_setup+0x144/0x320 [ 1622.340978] ? _copy_from_user+0xfb/0x1b0 [ 1622.341458] __do_sys_memfd_create+0x275/0x450 [ 1622.341987] ? memfd_file_seals_ptr+0x170/0x170 [ 1622.342520] ? __secure_computing+0x199/0x2f0 [ 1622.343041] do_syscall_64+0x33/0x40 [ 1622.343470] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.344062] RIP: 0033:0x7f8028ff5b19 [ 1622.344488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1622.346606] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1622.347489] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1622.348244] audit: type=1326 audit(1761153679.138:4488): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10034 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1622.348312] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1622.348326] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1622.354892] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1622.355714] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1622.374225] FAULT_INJECTION: forcing a failure. [ 1622.374225] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.377236] CPU: 0 PID: 10036 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1622.378930] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.380863] Call Trace: [ 1622.381496] dump_stack+0x107/0x167 [ 1622.382346] should_fail.cold+0x5/0xa [ 1622.383237] ? __d_alloc+0x2a/0x990 [ 1622.384082] should_failslab+0x5/0x20 [ 1622.384968] kmem_cache_alloc+0x5b/0x310 [ 1622.385920] ? trace_hardirqs_on+0x5b/0x180 [ 1622.386930] __d_alloc+0x2a/0x990 [ 1622.387745] d_alloc_pseudo+0x19/0x70 [ 1622.388631] alloc_file_pseudo+0xce/0x250 [ 1622.389602] ? alloc_file+0x5a0/0x5a0 [ 1622.389648] audit: type=1326 audit(1761153679.138:4489): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10034 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1622.390494] ? shmem_get_inode+0x55c/0xbc0 [ 1622.390525] __shmem_file_setup+0x144/0x320 [ 1622.394854] ? _copy_from_user+0xfb/0x1b0 [ 1622.395822] __do_sys_memfd_create+0x275/0x450 [ 1622.396257] audit: type=1326 audit(1761153679.139:4490): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10034 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1622.396884] ? memfd_file_seals_ptr+0x170/0x170 [ 1622.396906] ? __secure_computing+0x199/0x2f0 [ 1622.401433] do_syscall_64+0x33/0x40 [ 1622.401571] audit: type=1326 audit(1761153679.139:4491): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10034 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1622.402301] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.405923] RIP: 0033:0x7f4f9cabbb19 [ 1622.406795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1622.408104] audit: type=1326 audit(1761153679.139:4492): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10034 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8028ff5b19 code=0x7ffc0000 [ 1622.411107] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1622.411129] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1622.411143] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1622.417981] audit: type=1326 audit(1761153679.147:4493): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10024 comm="syz-executor.5" exe="/syz-executor.5" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4f9ca6ea04 code=0x7ffc0000 [ 1622.418621] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1622.418633] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1622.418645] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1622.441671] audit: type=1326 audit(1761153679.148:4494): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10034 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8028fa8a04 code=0x7ffc0000 17:21:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)) 17:21:19 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 22) 17:21:19 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4347, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x41000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380), 0x42100, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x6, 0x1, 0x6, 0x0, 0x0, 0x101, 0x20, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000340), 0x6}, 0x40188, 0x1ff, 0x6, 0x9, 0x1000, 0x7, 0x100, 0x0, 0x2, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, r1, 0xa) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800}, 0x1c) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) connect(0xffffffffffffffff, &(0x7f00000003c0)=@ethernet={0x6, @local}, 0x80) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_open_procfs(0x0, &(0x7f0000000440)='net/sockstat\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa', &(0x7f0000000200)=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0) syz_io_uring_setup(0x403d7d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x2d1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, &(0x7f0000000040)) syz_io_uring_setup(0x72d2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x78}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, 0x0, &(0x7f0000000480)=0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r6, 0x8983, &(0x7f0000000080)) syz_io_uring_submit(0x0, r5, &(0x7f00000004c0), 0x10000) [ 1622.661854] FAULT_INJECTION: forcing a failure. [ 1622.661854] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.663383] CPU: 1 PID: 10053 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1622.664216] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.665206] Call Trace: [ 1622.665527] dump_stack+0x107/0x167 [ 1622.665956] should_fail.cold+0x5/0xa [ 1622.666399] ? security_file_alloc+0x34/0x170 [ 1622.666937] should_failslab+0x5/0x20 [ 1622.667374] kmem_cache_alloc+0x5b/0x310 [ 1622.667855] security_file_alloc+0x34/0x170 [ 1622.668352] __alloc_file+0xb7/0x320 [ 1622.668782] alloc_empty_file+0x6d/0x170 [ 1622.669278] alloc_file+0x5e/0x5a0 [ 1622.669698] alloc_file_pseudo+0x16a/0x250 [ 1622.670183] ? alloc_file+0x5a0/0x5a0 [ 1622.670634] ? shmem_get_inode+0x55c/0xbc0 [ 1622.671130] __shmem_file_setup+0x144/0x320 [ 1622.671642] ? _copy_from_user+0xfb/0x1b0 [ 1622.672127] __do_sys_memfd_create+0x275/0x450 [ 1622.672668] ? memfd_file_seals_ptr+0x170/0x170 [ 1622.673210] ? __secure_computing+0x199/0x2f0 [ 1622.673733] do_syscall_64+0x33/0x40 [ 1622.674175] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.674780] RIP: 0033:0x7f8028ff5b19 [ 1622.675221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1622.677395] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1622.678289] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1622.679140] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1622.679982] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1622.680822] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1622.681667] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 17:21:19 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0x0, 0x3, 0x3}) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x2fba, 0x20040) r3 = syz_open_dev$sg(0x0, 0x0, 0x2001) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x84009422, &(0x7f00000004c0)={0x0, 0x0, {0x0, @usage, 0x0}, {0x0, @struct}, {0x0, @struct}}) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000d00)="249d566f9b6e45bb8db2f51b9edf49f5451b5812cb12c470b556498a498949884c67780a5e6765fd725c0151dd7b7397fe37c61d174f7fdb61f957e2f29cb127dc339c29cdd0d36098248b32f07fa55ccea92f29982fc8d38b86da3cd66c0801524eca386553ea3ccb55d1d781d374cb68d3554335bc6b") ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f00000008c0)={r4, 0x5, 0x8}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f00000004c0)={0x5, 0x7, {0x43, @usage=0xffff, r4, 0xca, 0x401, 0x6, 0x5, 0x9, 0x0, @usage=0x5c9, 0x0, 0x5094364c, [0x1a0a042f, 0x10000, 0x5, 0x2f200000000, 0x6522, 0x10000]}, {0x6, @usage=0x1, r5, 0x69f, 0xfffffffffffffff8, 0x20, 0xff, 0x554, 0x10, @usage=0x5, 0x8, 0x4, [0x8, 0x9, 0x7, 0x8f, 0x8]}, {0xff, @usage=0x5, 0x0, 0x1, 0x1, 0x80000001, 0x3f, 0x2, 0x15, @usage, 0x8, 0x101, [0x6, 0x9f98, 0x4f70, 0x2, 0xfcc, 0x40]}, {0x8000, 0x9, 0x8}}) r6 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x8000000) r7 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SPLICE={0x1e, 0x1, 0x0, @fd, 0x4, {}, 0x5, 0x3, 0x0, {0x0, r9, r7}}, 0x5) syz_io_uring_submit(r6, 0x0, &(0x7f0000000cc0)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, r9}}, 0x5) ioctl$TIOCSIG(r0, 0x40045436, 0x23) 17:21:19 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x0, 0x1}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)={0x0, 0x7}) 17:21:19 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 19) 17:21:19 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f00000000c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x10b) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) fcntl$dupfd(r4, 0x0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = dup3(r3, r0, 0x80000) openat(r5, &(0x7f0000000240)='./file0\x00', 0x4a2080, 0xaa) sendfile(r1, r3, 0x0, 0x80000001) r6 = signalfd(r3, &(0x7f0000000040)={[0x80]}, 0x8) sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000002}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="2fbe3edba3b63415e6e792ecd3c76e19761ab0b7b5eda128dcf0a71c66730eb07168dc0759eab0a06931d72604c75eadbd0c5867523d40f35470cf3ae9829b5fb02749b28ab51bb07aa3a5e9c710d7a0da7d0eaac2c87d2022f9d7fb64e46423e356848a9121c8c7022e711571b6c9a6ff1a92f17497dd2c34e982d5", @ANYRES16=0x0, @ANYBLOB="08002abd7000fbdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x20040000) 17:21:19 executing program 2: syz_open_dev$sg(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@noacl}]}) (fail_nth: 23) [ 1622.777314] FAULT_INJECTION: forcing a failure. [ 1622.777314] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.778744] CPU: 1 PID: 10060 Comm: syz-executor.5 Not tainted 5.10.245 #1 [ 1622.779561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.780542] Call Trace: [ 1622.780859] dump_stack+0x107/0x167 [ 1622.781300] should_fail.cold+0x5/0xa [ 1622.781750] ? create_object.isra.0+0x3a/0xa30 [ 1622.782285] should_failslab+0x5/0x20 [ 1622.782734] kmem_cache_alloc+0x5b/0x310 [ 1622.783207] create_object.isra.0+0x3a/0xa30 [ 1622.783716] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1622.784306] kmem_cache_alloc+0x159/0x310 [ 1622.784794] ? trace_hardirqs_on+0x5b/0x180 [ 1622.785307] __d_alloc+0x2a/0x990 [ 1622.785717] d_alloc_pseudo+0x19/0x70 [ 1622.786158] alloc_file_pseudo+0xce/0x250 [ 1622.786646] ? alloc_file+0x5a0/0x5a0 [ 1622.787090] ? shmem_get_inode+0x55c/0xbc0 [ 1622.787601] __shmem_file_setup+0x144/0x320 [ 1622.788106] ? _copy_from_user+0xfb/0x1b0 [ 1622.788595] __do_sys_memfd_create+0x275/0x450 [ 1622.789117] ? memfd_file_seals_ptr+0x170/0x170 [ 1622.789674] ? __secure_computing+0x199/0x2f0 [ 1622.790206] do_syscall_64+0x33/0x40 [ 1622.790637] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.791473] RIP: 0033:0x7f4f9cabbb19 [ 1622.791984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1622.794164] RSP: 002b:00007f4f9a030f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1622.795046] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f4f9cabbb19 [ 1622.795882] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f4f9cb150fb [ 1622.796719] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1622.797552] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1622.798395] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1622.836214] FAULT_INJECTION: forcing a failure. [ 1622.836214] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.839099] CPU: 0 PID: 10066 Comm: syz-executor.2 Not tainted 5.10.245 #1 [ 1622.840704] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1622.842633] Call Trace: [ 1622.843246] dump_stack+0x107/0x167 [ 1622.844091] should_fail.cold+0x5/0xa [ 1622.844973] ? security_file_alloc+0x34/0x170 [ 1622.846020] should_failslab+0x5/0x20 [ 1622.846900] kmem_cache_alloc+0x5b/0x310 [ 1622.847847] security_file_alloc+0x34/0x170 [ 1622.848844] __alloc_file+0xb7/0x320 [ 1622.849712] alloc_empty_file+0x6d/0x170 [ 1622.850649] alloc_file+0x5e/0x5a0 [ 1622.851472] alloc_file_pseudo+0x16a/0x250 [ 1622.852444] ? alloc_file+0x5a0/0x5a0 [ 1622.853337] ? shmem_get_inode+0x55c/0xbc0 [ 1622.854322] __shmem_file_setup+0x144/0x320 [ 1622.855315] ? _copy_from_user+0xfb/0x1b0 [ 1622.856275] __do_sys_memfd_create+0x275/0x450 [ 1622.857337] ? memfd_file_seals_ptr+0x170/0x170 [ 1622.858415] ? __secure_computing+0x199/0x2f0 [ 1622.859459] do_syscall_64+0x33/0x40 [ 1622.860320] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1622.861514] RIP: 0033:0x7f8028ff5b19 [ 1622.862374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1622.866635] RSP: 002b:00007f802656af48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1622.868394] RAX: ffffffffffffffda RBX: 0000000020000440 RCX: 00007f8028ff5b19 [ 1622.870048] RDX: 0000000000004200 RSI: 0000000000000000 RDI: 00007f802904f0fb [ 1622.871698] RBP: 0000000000000005 R08: 0000000000002100 R09: ffffffffffffffff [ 1622.873358] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000008100000 [ 1622.875007] R13: 0000000020000100 R14: 0000000000fffff0 R15: 0000000020000140 [ 1873.218093] kworker/dying (64) used greatest stack depth: 22856 bytes left [ 1873.220184] kworker/dying (327) used greatest stack depth: 22848 bytes left VM DIAGNOSIS: 17:26:21 Registers: info registers vcpu 0 RAX=ffffffff83e989f0 RBX=0000000000000000 RCX=ffffffff83e8065c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e991b8 RBP=0000000000000000 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85679f88 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e989fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffae5c7b010 CR3=000000000fdca000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=002c02fe016c6c6f502e726567616e61 XMM02=00000000000000004113f6a000000000 XMM03=00000606060301301fc45dfc00af39e9 XMM04=6578650a006873616d7320636578650a XMM05=6f747563657865110073646565732063 XMM06=63657865090073747261747365722072 XMM07=6169727420636578650b007a7a756620 XMM08=69646e616320636578650e006e656720 XMM09=6873616d7320636578650a0065746164 XMM10=78651100736465657320636578650a00 XMM11=00737472617473657220726f74756365 XMM12=636578650b007a7a7566206365786509 XMM13=696d20636578650d0065676169727420 XMM14=6e696820636578650a00657a696d696e XMM15=00006c61746f7420636578650a007374 info registers vcpu 1 RAX=000000000000000d RBX=1ffff11006adfeb0 RCX=1ffff11002de5132 RDX=0000000000000002 RSI=0000000000000008 RDI=ffffffff86871708 RBP=0000000000000008 RSP=ffff8880356ff548 R8 =0000000000000000 R9 =ffffffff8687170f R10=fffffbfff0d0e2e1 R11=0000000000000001 R12=ffff888016f28970 R13=000000000000035e R14=ffff888016f28990 R15=0000000000000100 RIP=ffffffff8126ba10 RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007ff7587b1700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffae3ce5000 CR3=000000000ed82000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000003f847ae147ae147b XMM02=00000000000000000000000000000000 XMM03=00000000000000003f7354a860385625 XMM04=00000000000000003fdadaeb8ec15541 XMM05=000000c00010dc20000000c00010dbf0 XMM06=00000000000000003fd3333333333333 XMM07=00000000000000003fd0000000000000 XMM08=00000000000000003f58040d03853800 XMM09=0000000000000000bfde4e625962e12e XMM10=00000000000000003f999999999999a0 XMM11=000000c00011e0f0000000c00011e0c0 XMM12=000000c00011e150000000c00011e120 XMM13=000000c00011e180000000c000086e70 XMM14=000000c00011e1e0000000c00011e1b0 XMM15=000000c000120420000000c00011e210