a441cbced011f9c2cd4e8976a92bb3e4c8a8faa9664e5f4412e4fdf14800a603e8f7c5f5e9c1adfe01dfc897c66272af5210eafc4129c3acb39c761a155b140c90d03eb032fc99855b4ee7a4b3b80c7d90c9a7dd306e67b78e90cacb1f4c1450c8a1b524327a9aabceec940e8eb0c0bc1403c77d3ada509e4d230c230ae6b3490b3eec6", 0x1000}, {&(0x7f00000025c0)="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", 0x1000}, {&(0x7f00000035c0)="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", 0xdea}], 0x5}, 0x0) 04:54:10 executing program 3: r0 = geteuid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@empty, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, 0x0, r5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000300)={{0x0, r0, 0x0, r0, r5, 0x40, 0x300}, 0x0, 0x0, 0x7f, 0x40000, 0x7, 0x6, 0x7f, 0x1, 0x9, 0x4, r6}) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000030003d01000000000000000000000000080001"], 0x1c}}, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x6000, 0x20, &(0x7f0000000540)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000640)={'sit0\x00', r1, 0x29, 0x1, 0x7, 0x4919944c, 0x10, @mcast1, @mcast1, 0x700, 0x1, 0x4, 0x40}}) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000240)='.\x00', &(0x7f0000000180), 0x10b002, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_any}]}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)) 04:54:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) fsetxattr$security_selinux(r0, &(0x7f0000000100), &(0x7f0000000140)='system_u:object_r:gpg_exec_t:s0\x00', 0x20, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000180)={0xfffffdf3, 0x5, 0x2, 0x8000, 0x9, 0x6}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) capset(&(0x7f0000000100)={0x19980330, r2}, &(0x7f0000000180)={0xfffffdf3, 0x5, 0x2, 0x8000, 0x9, 0x6}) clone3(&(0x7f0000000340)={0x6000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x7}, &(0x7f0000000240)=""/124, 0x7c, &(0x7f00000002c0)=""/13, &(0x7f0000000300)=[0xffffffffffffffff, r1, 0x0, r2, 0x0], 0x5}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x7c6, @private0={0xfc, 0x0, '\x00', 0x1}, 0xfffffe01}, 0x1c) 04:54:10 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:54:10 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x39c, 0x5, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setpriority(0x1, 0x0, 0x7e) timer_create(0x0, &(0x7f0000000200)={0x0, 0x3d, 0x1}, &(0x7f0000000240)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000840), 0x6e, &(0x7f0000000980)=[{&(0x7f00000008c0)=""/159, 0x9f}], 0x1, &(0x7f00000009c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x2020) getpgrp(0x0) clone3(&(0x7f0000000b00)={0x10040080, &(0x7f0000000600), &(0x7f0000000a80), &(0x7f0000000680), {0x3}, &(0x7f00000006c0)=""/75, 0x4b, &(0x7f0000000740)=""/243, &(0x7f0000000ac0)}, 0x58) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f00000000c0)={'ip6gretap0\x00'}) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) timer_settime(0x0, 0x0, &(0x7f0000000400)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000180)={{r2, r3+60000000}}, &(0x7f00000001c0)) statx(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1000, 0x400, &(0x7f0000000500)) r4 = socket$packet(0x11, 0x2, 0x300) sendmsg$inet6(r1, &(0x7f0000000bc0)={&(0x7f0000000640)={0xa, 0x4e23, 0x4, @private2, 0x9}, 0x1c, &(0x7f0000000b80)=[{&(0x7f0000000ac0)="85b0034a94c354f86052f8fe61222ef5d600189ddb06c322044a17172772d9f1a946cb7bff1b00b11bd0c115", 0x2c}], 0x1}, 0x800) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/self/attr/fscreate\x00', 0x2, 0x0) sendfile(r4, r5, &(0x7f0000000c40)=0x3ff, 0xfffffffffffffffc) ioctl$AUTOFS_IOC_PROTOSUBVER(r1, 0x80049367, &(0x7f0000000080)) [ 196.123262] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 196.246946] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4339 comm=syz-executor.2 04:54:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) readlink(&(0x7f0000000000)='./file2\x00', &(0x7f0000000200)=""/134, 0x86) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x105102, 0x4) fsetxattr$security_capability(r0, &(0x7f00000000c0), &(0x7f0000000300)=@v3={0x3000000, [{0x800, 0x1}, {0x800004, 0xd96c}]}, 0x18, 0x1) 04:54:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c90000000200000000000020801000470001200f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000001880)='./file1\x00', &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x9, 0x4, &(0x7f0000000780)=[{&(0x7f0000000340)="060843bc011258bdbe5ac7a0740d7cda639fdb6dcea875d2755cb829d2262637b1c0ee770c3a7063430eaa7b5b6dbd28a9c6eb16e725b774d7fe2755771115fe852287cb6de5b66667822fc9ef7949f7bc261f8409326b61b38bf05e377b1de4281017c15de6fc17aaae7d30", 0x6c, 0x1}, {&(0x7f00000003c0)="a3b644e07c800c934a541cde6a116a41132a60a6e18c2b00f89f7d5adcbfacdb2919783693dcdd340ad6f14e4b1aa1a28abcebdfdf8a707287c4fd1e8457c2ac7db0ef6243909be7fb89dd95b390aa58933924f825a44dbcdf89a0669a3771f72dfcd6cde11c0a1e0a7ba108c54e9a5106ee7ea6e3d5d25d1c66b990f6a4711968c040967713e9993e8d014177c6abde5c557b25d14087034cf170a68df41da1ffd60c9df8baffa399634479c2932f908aad67231cc03ad628e5b0a1ad35e226b69fd014c0cf41766b227d3b0012c7f26fd6a832ef8083e69d37d53ebc39192d0c", 0xe1, 0x3}, {&(0x7f00000006c0)="f217155c0c73929bda052549aad9bdba606c111c00a8529d41b5c043b42d6692cf4ad762cb6e278e5ec766649ca59ab24a254bbc749279364b98dc4e801aee74e5d3", 0x42, 0x1f}, {&(0x7f0000000740)="7203823fd245ffac80734ce3d47b30a06ec8845b496d72b642f72fdda01ff2150e7fb2d943a66745c8d7b26f44b1571becdedc147bce", 0x36, 0x4}], 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="76666174002c76666174002c7365636c6162656c2c7375626a5f726f6c653d5b7d2b5c3a0d2c6673757569643d35613763635439662d396432372d650003622d373061652d37316333643233612c736d61636b66736465663d76666174002c7569643c97c246afda42f3826e11fefc7809dc0d1b4c509961fb21d33f965c9fc9f491ac77f3ec27c37ff9a385b75f34a2870298c0f49c138eedfabe99fc2a1c44dddf9551591a1d4a18f23d0af0ff0070fcd96ba7054280f820eee9498df25bc15fc4b31284bb612c488bed9289363c9076ce26b939cf642e8858bbd1ef", @ANYRESDEC=r0, @ANYBLOB=',pcr=00000000000000000038,obj_user=,\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x324c1, 0x0) r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000940)={0x1fe00000, 0x0, 0xfffffffb, 0xdac, 0x6}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f00000004c0)) r5 = signalfd4(r4, &(0x7f00000001c0), 0x8, 0x0) pwrite64(r5, &(0x7f0000000200), 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f00000002c0)="c106e901fad79dbc1e06bda3cb4f0924dedcfbdf47a7682a2922734d15e34d4213a0db86630dd6b5b3a14f28433b838be9b2c98cf00527bf2c75c53e0c8195ccad7663d571f9f204c4ff398f938e", 0x4e, 0x80000001, &(0x7f0000000040)={0x0, 0x3938700}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x4, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r2, &(0x7f0000000240)=""/72, 0x48) 04:54:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000000c0)="a3", 0x1, 0x0) openat(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) write(r0, &(0x7f00000013c0)='w', 0x1) dup2(r2, r1) 04:54:25 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:54:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x4, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioprio_get$pid(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10, 0x0}, 0x811) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) listen(r0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000680)={0x0, @l2={0x1f, 0x4, @any, 0x0, 0x1}, @generic={0x2, "57e024fbba407bb59a5b9582ef04"}, @vsock={0x28, 0x0, 0x0, @local}, 0x1, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)='ip6gretap0\x00', 0xc4, 0x0, 0x40}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8}, {&(0x7f0000010300)="0300000004", 0x5}, {0x0}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) socket$inet6_tcp(0xa, 0x1, 0x0) sched_getscheduler(0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000040)={0xa, 0x4e23, 0xfff, @private2, 0x8}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000140)="7117ebe8d3f368cb17c4f8f1edecadd303980780eb6a5e2c51f7b573672c2214e2cbe4653b4cca19f6de60", 0x2b}, {&(0x7f00000002c0)="0f0e4fa4cfd22a0bc79dd87529e42169770f2cf1fbe64291afd24e36e1bdf99d55a8ffe5270ea58c9f7e8665bdd2121fcdbb57606d1c620721d160a83d835ee52a09ad9592450ff3d78a6b839e97b0e85cc719a2318261e770348086c7e715438e0b104fc6ac1b43de7132fb517556f494023efd4165a0536dc5fb62f6cf560b49ab1dbd45df94ec2a677117d7f6442c6aaa51fcdedc398c6643f848a6340d1baf5bf385e4c19a4a29acfbff5011313cf847bb7c1b6e74cbdd17cf5de721c6441023120744e09666b17b01f9e36b773c64ef425d1d45c986db7ee4982c5b38", 0xdf}, {&(0x7f0000000180)="3388754427314da8529e2d80194ad40382d8c2794006dbbccafef5b328fb2ebd321e7d0ed7573f04372b09a54dade423ae8b4cc563a6a5c622e12f65e72694646652b7384ff85643607c7968d517dea17f874fd97914b019d8441a56540b26c1c18100fff07bc2d8325a34790e046f4541", 0x71}], 0x3, &(0x7f0000000700)=[@hopopts={{0x20, 0x29, 0x36, {0x3c, 0x0, '\x00', [@ra={0x5, 0x2, 0x81}]}}}, @rthdr={{0x48, 0x29, 0x39, {0x16, 0x6, 0x0, 0x1, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}, @hopopts={{0x1158, 0x29, 0x36, {0x3b, 0x227, '\x00', [@generic={0x5, 0x1000, "19600a2ad3088608e4eaeac5b652aa411e13345f7f12b132aef393b981679cb96cfc8fd6d5348e642ebd762e37db593e18311b10350b3b5295ca2b3b367592eb3f712989ad32d099227371d2cb383cdf964bb038d8c856345b0f7a833a0c386ca8d5e7830ef8b5e426845a596ecb54124c9e0f49670fcbf04b36d256fd6ed9341f729cccaff041912eda877f6a3ff8cd28e520200bf8569a77fb9f71b98e2651067b513b8b2bb8c36e07586e665582eae13a87083a44d74102118db78282771f088ca6e63b4bbb95b8b79219fd581d13beea104f2c9a0531dab906bd31bdab7c72f2df20750fb5b2d66e7a08969392c2a0e2a5acf4c4e77aae2acd1008874c1a5de56cc194fac7332d199e3b4c0d80b803aff3503ac7df1173688981759eae715bc044b7c06682e5b234ba7acec5f6a7c9bbc33cf11812ff972a0feb852b6f5c7c157281b08879014df8c0fb9241be3d09fdb6081e995d380b394a6816f8a2e73092298d72652f9a2ca3b6af9156bc93602dbaa91d592161df25d56c8aabc39ccdc9ba7dbe33ede3bfa81ef41c417efd4726b77c6315a2bd9228bef3f6a6a4e70f850266e992d3d47e1027faa9369198848ef19562bd7960160c35d887b12a856dbafc0149401f940b000640e07db03452270ab4be938bbfcce4c03866aa3d41c24a37d5b2d240cc53bce86ba457510fe2c5aa176f6d65f81353e8e3ddad71344128317f2509740052f244246413ae0ddcdfe56bb210bca066884e184a517dc5f980b1838ecdc922ee4b77ddb5e1e4af5695f3c2bca0efba7ffed0b1b7e966f3256709fa83ee40d710d420776ae432f35c214865271355ea6105e5e9504197d89e13278a10a5a24123f5fe00bac039c0fb65f1a99f2398dd8dc05c37162d0f2890ef0490ddabbe501f55540c47e4e9dccde9daef89f98582adebe45469ae2dbe6e70af64ae33aec43004fa8a2b33863a32c0bedb2e40c62fe4f9946206e2a33a6e6c12008e18a19fe47165a4a4dcc377247c03641014316bcbde5603afbab2cfa7eef4b9a4ff24b99a54632b775e786526e36a42ce096db8c7f22da2facba8588b340035432831d3006bc24e396098526ec9316cc3fd4a7712e0aac7a7db33b69982c621b76da57557f9a14b7068643bb00acfdd1d94fea3dcf508a99a615e57a235b568d17253c628f90667444aab07d6ca14febf6a69ee02dde429ffb6fe90d8c9e3dc5fef468304004131f7d1f99a8792636251efb715a9ad77749f693295803f1cb20f22094b12483a2bfc0cd4d9e3532cf5a8f0ab567a2f41da38b74066f13f6a8a7802fad37a6ee6779628ec36bb2478cdfe0b6cb9fe7b6c1182cd1bb6cd5b4d30415edbf3d29ba825b8c375046828163059b07a80c5b9ddef4f67789140dffac197fdf7f113e9d272452db7f9f55f6b57cf47bcb7e258475ad21c4688ea294954d5a2deecc8efecd7d98c632de77dca63f2bc8847e035444a0063e6060c6aca7aade392567718218a45581085dea43684b5422c7259183108f5aea92785e7e082b05e60525fc460ad00eb71401d4c4d25d6366a661910dce414b57eed3007493a07346bbce14602493caec3da6fbe3595ed1c8fad0b52188c827497f31a3815f22f1b12a661218a2d568418882a7301d952ffdd8849e3faf2156300f940ed4eafe3e9c8bb2b9ba7acbf6aab9d8739a4929dceec5cd9605837b92d008b4ae3ae8973a04d8faffc7c27d2bb8e161bbe04ec53d93c69b32fd3bf53c8eb06f36cb8f3db17019ad619c625d33843457b1acf83bb1c80a5dcf83e3b2172eb256aa5c31a8a7e0bedbbdce2738e58567848a90478959cd1c2e55d52f3b97cc6d19af97d597b935c6db945dae926c4da0b8310cfda8ede4e5d34ce1bd044f727b874d25eda84d9fcc6c7bd43a8676d13cf0af02aaf8c1e1628448d665a78a843fc751d81904d070a6bd2dc5f1644ad08edb661740d3852ab7d9c8b0ea9256f655d5d35e0ec039391e7a6ad9d89f4e7af47feea1633862ebeee9b6aca248eb4dbbabee0dcd24ba6c505824f4a3e3cc06bd7c454eb0e1a4dd8ca9910c4a662befb83666b160482e451f05c1a914f08b3c8881dad4500782ab6f73c27711b9004510e553870140f5d254eb2ee5bd0cc27a1ce5a1f6261e3876e7cc917f4fedc149e3585e5a54786b5effb13c26fd4640ea9a74ae373c226f6380a6928ee6540a90f23d495d946d6708fa45d8e830ab62f802ffab029d709f5142127963529509f561bea7dd266d886cf6146064161fdfcf11d17df292d224191de1f0e1716c4adf5fef95344ff516a0adf1731643fe6dbd62a793f81744dd64feaa1162760792bb3155880dc21f0caa82396bd15530236f5430293ba952f2f05ebffd7b593379d0f352fdf6dc791e7801eb3fb18ca10fff5f8070b05b209b60cdf165f335ff4bbae9cdf0e8ff2428609b9119b59005426996a429b01042111915c4274a614c3a0a6e2c1329f741b8bd01818c754c79fa98d7b825711c313ece56e32ace07033cd21e1bba9cf464bab42991770c3b36987b1266f2a7843167212c95b6cfa28026499f48af96ce6637386e707e550c021cfbf2be2d8822d2013da42d3304dd6d3a135749cb2a305ef0a8fea3bedbc086294e4d135b9018d83592bac5a844263d4e9225bc3dbf9b4ab2d2f4dbb0281a66e1b263ea7fdccd99b232cef3c6a241ebcadad7024f799fc08a943082f7bff4d2453363626275b6bff3e27dcf2b28d5a4b29ee6916606e3f6f2bf6cca842801d014a6d1925598ef9e5a70fc5ac1956907354fc6a16889b53ba1421debb7675780cfda865fe531bc745ed03a5441f457f70ba84f6a023880497b3f93809e0fe9bfc73e8a5cdd86626a3da7a6b83e2ece37b7b644b5b5e2a5d69d8f267be7cea1c319fa4e636a7b7ea932376dba9db162671640b1792862ffa2867636ee3edbb03dbcaedb6a1cffae511196ac30e7801e1c572dd156353ed918a45618c302f001afe74709094fe14878c5d8659022feb991d00ca6ab6db01874373543f6ec959a6717e916c3f379d20abe4389876aa67c24f7d3ffad38144a24a2bc78a7ec075db4e3ddca8204dcea2f21ccb6a9f64a550ed7b6e20b4f88d33f1cfa06de233138b563c4706493f8d9081010a16dbc05845cbf748666d6a59e063f08627f610593d6c497f76aa97fce82909fec3f5e2d6eea3c01200e5da740b91ed119a625a7347b665fd86895bb9b7349d9ef80fbf7335380ba817843a9ff70d23f92d679badfce370746b566111341376b808c6f2dbdfd8e03b83f4c59af9709cdd877703dc6b4d0ace4eb3938a500cbac3a6e38a027ea382adaee941441670e232838b633fa18a52ed606d7416007e70b49339119f34e71f562c3964455f33cef69ec9c6e35421cf273a942f1f17fa553cb0ab69f25c0a0a721b65ab1e019332cb3f7ec66a88920ea921d255ae64b5246e9bbbcb96487d83b2785ac452bdad820706575b6d07e5d24ca4dab586108d1d7bfaf22497e77578980be143f439beb04ec6195d66c760f135f0643944f50390dfc3911a2f16eb1abaa36d439405926d112e3ef530fb41daf6392741457449b8ca034cf0b4be71a5cf13e6f79a29e32b6a473b8fdc7480a524ce711233859f1de8a547be2b2150dfdb8af4f2b5cb483555737f3c6be8dc804539d60f8cdfe7744221a6bd824d25d2016f723b97220305f2cd86e225fef28b277a864f68e7f0eb4eb5667746bb1cee9e49bf97d180d971d87210242ed1d38b058cd3f04ed983a9aa9f7adfec55b92de7b9c0c329477f5dc4209e676cce27f8c014eb5f902f1bfef5dab880a72ffb70240c74bfe739aa17b19fcabbe594bced1446776f4bdf1a34db093643f48b08b03c037fdc3dca84e15ceac44ccb086506e5d7427f639f1df649c4708120b545a0eb0871a8db8e20ca1a5e8306f67d53c8c2daf13ce687215dd8b093e4461d76affbaa31b5753744ea26ad375f7b0bfbb9ab185374881b2aed42460794d5a86bc90c9238cbf297752544dfb6a1fc986ad0568522f1dbdfd546f84a56552a0fa8ef812b134b1b1eccf80ea47b190538b323598aca2bf2cbbfa2fd018cfa175e0a9ba3acb42646760bea18b6511373292b905af4abd0cce5f7917a9f65ec0306b10f0efa526eeabe75603022a2564b3a60887b9a4c4b1335014204a8aaa0e61051d4a7a956307501114d81803ef8213282e8d091808bc066a95fabeab06af0ccb4121a4dabbdcf7fae11d2a4cf1a98155b30ead0329ff33720c0920853b7a8d513d7224b836081f7d1e936c88bdb0ab2c4eec1be5e200d91b38e66d5291a4e730105411d9f44f9940a28642f0c01eb2befc354d560b8c60254bfe418d2ce47f08493c58d5b47ae46cc79b45ba36e5b3699a1b970cb7cc0f62755e9d6fae6b7e8b22573c4c9b7f66d4ce675374086506be99f28a86c59bf65d696fb5a9530d877dd82363f826554d5f729e93991696f97042f6915bfe8ace593f49060747d35c409071b4ee6619b141a4c05f9dbd0d5df87f648e50adf4dd132b882d7df25a4710d61f7eed6e46d173af3108a8ad09fd89c794f2ef9be1866ed5f03e8f784b33e2120328f29520c9ad782d2bc0ede3cc458ba9fee3df996522859b14c84bc6f514242e9aa935ce67295e4e0306fc086cfced3ec0daa13909cf5c7c4ee48330b0522e8fa367e4559b8a9652d30910faf0b60154cb98cea2314c8e6329b73008cf4dc2cc7d4b19d824ae4b1aaa9659dd6adf7696b080dbee7cc3d163e24ddc424a1d685a92b19a70be1c142b36cdcf0630bb074ff6400b03e17cb2497081b86a4c71be44a5a5de191034ffc4332ba103cd330899b8ab40a817fc3396ff1cd6711db6110c1a2e0b27f210bd8d347017115a0945f8d3e3fc140705b13975b4e05df7dcf08215c3025fd1aca405dfef1e55e579466ecc219c8b02dba38f59d85a22ea9733f25045440342351061554fc6baddfcf7b15de5ff538032b512137a812e4edd367b4f15c28b80bb3587b54a3d0f7cfdabedd36f6a791e7b5998d8bd055d0d7a4757d423e2015a2e9774802e66a668deef3797bc23fab0317554fde9b82dc631d7b62f7765c6ad1269b8b02b50b16e724c6fcf973a5d5a20b76bafe600e73e98519b4ee688eb5b9b673dec900e776e8909744074b2739bf702717dd872b636511f1929ea8fa4449402f54a30a07b2948b6fbaaa1323e3e5c3341515000101c066f616f6d263514ef87895135f299dab7c1a818c1fa1a8a777f5aecd2db859c8c5082356f5352f8c57d14bd7e29f71c81df8b08eb6f08ad4b0c59bf22ec95c3bdacba66e286e9ea757a3718707f53a33d9dd55e5ec0026c818e2668ad1312fb7e6ebcafc3ffb0a5250314afc077ef26be41c4cbed1a9f9eac435305b7947410431d1acb31b63bfccdbc624185c702d6c50f4a3770056870202ed5f3f8799a887ae2082a3cecfd98285e9115ebcd746341ebc69a0f10caf922ad7e810be245d582a0e71905659186b87eba629bfe6de41bd71275f02f92aab807a6227fd0bec99d18acec34da5dfe2249e57a9ec3636c47a5daa1e89cc0f0d2f72cac7a496fc8ec052436b48956ec7976edd7bb2d7aff82ad2fe23b5b92f8e64379d72d783ca733126469a342b8269e92b628bbd90c40a3dc46c2306344dfab1efd9665e87678cad67520e6f47f4d9d1f4f855026a9c8cc575565a79a9ee62e1c7953fee19d09b439a7f35976c2231a0eb2967fce6d1c316732909be7f6c6566e78c9901e6fcc17406797d"}, @jumbo={0xc2, 0x4, 0x6}, @calipso={0x7, 0x10, {0x0, 0x2, 0x1, 0x5, [0xdb72]}}, @ra={0x5, 0x2, 0x8}, @hao={0xc9, 0x10, @local}, @jumbo={0xc2, 0x4, 0x401}, @generic={0xc0, 0xf8, "b73579d80818415bab35797803c3ffe29806d205d4a621ba70a1c51a9bd3aec5c8a91862eba62b8ce0b6f4371707456738e841ce051577777f8fbe82b63bb36580179c1423c87d48916399db8c4b069002f9a8f737747cf32cc99a533fdd55217bf39d35a8bb7580d3ba7e2154bd4cb7111e38793e516c3e8925c13412dfc067b16b72e50142009d594e6c5a0b752d91c26deaf2900108e9b621f6d5fbcf63151e4b7d8d2a0693e36e111bf2fc67116632532db70ee70af957042b0383db6c28bdcaf7e7da76daf5688bc44cb6c4279ed640149a264eb9562055af96cb39ca1e3fed0cc436b1bf6f3872af19b924942f6d6ea37489c71362"}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x87, 0xc, 0x1, 0x18, 0x0, [@empty, @mcast1, @private2, @loopback, @private1, @loopback]}}}, @rthdr={{0x28, 0x29, 0x39, {0x84, 0x2, 0x0, 0x1f, 0x0, [@mcast2]}}}, @hopopts={{0x40, 0x29, 0x36, {0x1d, 0x4, '\x00', [@padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3}, @ra={0x5, 0x2, 0x9}, @hao={0xc9, 0x10, @loopback}]}}}, @rthdrdstopts={{0x68, 0x29, 0x37, {0x87, 0x9, '\x00', [@ra={0x5, 0x2, 0x401}, @ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x10, {0x1, 0x2, 0x0, 0x9, [0x9]}}, @ra={0x5, 0x2, 0xb}, @hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @mcast2}, @pad1, @ra={0x5, 0x2, 0x5}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xffff}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x2b, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x1f}]}}}], 0x1340}, 0x22004005) 04:54:25 executing program 3: r0 = geteuid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@empty, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, 0x0, r5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f00000002c0)=0xc) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000300)={{0x0, r0, 0x0, r0, r5, 0x40, 0x300}, 0x0, 0x0, 0x7f, 0x40000, 0x7, 0x6, 0x7f, 0x1, 0x9, 0x4, r6}) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000030003d01000000000000000000000000080001"], 0x1c}}, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8914, &(0x7f0000000140)={'lo\x00'}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x6000, 0x20, &(0x7f0000000540)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000640)={'sit0\x00', r1, 0x29, 0x1, 0x7, 0x4919944c, 0x10, @mcast1, @mcast1, 0x700, 0x1, 0x4, 0x40}}) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000240)='.\x00', &(0x7f0000000180), 0x10b002, &(0x7f0000000200)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_any}]}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)) 04:54:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x14, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18c0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x4, 0x1, 0x6, 0xf7, 0x0, 0x1, 0x400a0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x81, 0xe23f941e0d95d808, @perf_bp, 0x588, 0x9eef, 0x800, 0x0, 0xfffffffffffeffff, 0x80, 0x7f, 0x0, 0x1, 0x0, 0x1}, r0, 0x7, 0xffffffffffffffff, 0x2) unshare(0x42000000) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000940)=ANY=[@ANYBLOB="0000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000ffffff7f06000000000000005f0500000000000003000000000000000002000000000000000000000000000000000000000000000000000000000000ffff00001f0000002d0000009c3a4a0c1e5be8bf0000000009590000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a500000000004ef333e26e00000000000000000000000000000000007641f27c3325770f00000000000000000000000000000000000000000000000000fbffffff0000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a226b00000000000000000000000000000000000000000000000000000000000000006a775bd3384c1443bc3237854d8e1cb380a65be0163a9a7429e4d2ef2bfe1bd409db5c013e4c5b886f67324a6a51b271292be2808f445331261f6239b7d656ea8f2ef94b9e19cf0cab0f000000008d7512eeeebfa385090ba68221e0f792b14d096ab5a91eb1e3fa9e08959bf8fb3928d0f616090050106824d09d03de594ede69f24275484b33e8e63c875607b3cb91d164080922622440b86b1f06dc473c8ccf96de0705b3048f3c7ce9a85c62f7fea55f0dad4898fe8a51e63bec16ca0f891b29ed901702888f47b706418b9a5d3e0316340642e169e7bb3598f21e1b7be1f5c1b7398332073020f6bcc4120f5581e80514fe054950c0afb286ab2469e781ff50a0c23d3f0e52b3b11bb10628e0009ddb1f7b50fcb9a4840e4bcf6d3202dd7fa0a01cc23ce385a9a4020fd1e6bff5ff60b8811ce1e209c9d2472dfbacb6a20dbc396da2350a7e0ccf15075ef0d7f209db61b43c582fe34f69a40a77ebc79b1669a3e938129e7096139fe126b9b4432a77af26a85f8c"]) unshare(0x0) 04:54:25 executing program 4: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = epoll_create(0x6) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r4, 0x8983, &(0x7f0000000280)) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r5, &(0x7f0000001100)=""/4095, 0xae3, 0x0) epoll_wait(r5, &(0x7f0000000000)=[{}], 0x1, 0xfffffffd) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0x1, 0xff, 0x7, 0x7, 0x0, 0x6, 0x100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000040), 0xa}, 0x4, 0x80000001, 0x1, 0x7, 0x1c, 0x7, 0x1, 0x0, 0x1ff, 0x0, 0x4}, r1, 0x7, r3, 0x9) pidfd_getfd(r1, r6, 0x0) r7 = dup2(r3, r0) r8 = eventfd2(0x3, 0x80000) sendmsg$nl_generic(r7, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x3d, 0x100, 0x70bd29, 0x25dfdbfb, {0x18}, [@typed={0x8, 0x7, 0x0, 0x0, @fd=r8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x10000011) [ 210.650021] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 04:54:25 executing program 1: nanosleep(&(0x7f0000000180), 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) clone3(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x80000001, 0x80000000, 0x1, 0x2, 0x10000, 0x1}) 04:54:25 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0xc1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="06000000000000802e2fff0300003100"]) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x6) r3 = socket$inet_icmp(0x2, 0x2, 0x1) copy_file_range(0xffffffffffffffff, &(0x7f0000000040)=0x9, r3, &(0x7f00000000c0)=0x1, 0x6, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000006000), 0x0, 0x0) ioctl$EVIOCGLED(r4, 0x80404519, &(0x7f0000000100)=""/83) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x4c06, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8aa3, 0x2}, 0xca0cc, 0x7, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000180)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x324, 0x0) [ 210.821498] EXT4-fs (loop7): unsupported descriptor size 0 04:54:25 executing program 6: r0 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0x1c) tee(r2, r1, 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f00000000c0)={0x0, 0x800, 0x0, 'queue0\x00'}) close_range(r2, r1, 0x0) 04:54:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access', 0x3d, 0xffffffffffffffff}}]}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={0x2c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x6, 0x1, [0x18, 0x0]}]}]}]}, 0x2c}}, 0x0) r6 = socket$nl_audit(0x10, 0x3, 0x9) fallocate(r6, 0xe, 0x7, 0x1000) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x50, r3, 0x200, 0x70bd27, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x7, 0x8}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000010) 04:54:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001180)={&(0x7f0000000140)={0x38, r2, 0x4, 0x70bd28, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x41) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001540)=ANY=[@ANYBLOB="480100001800210c00000000efff00000a00000008", @ANYRES32, @ANYBLOB="2c01758008206700", @ANYRES32=0x0, @ANYBLOB="acec99c92389fca9d675f052039be27043462e49cb27d93483e95704581c0e610886305e70d6678df9c3acd08b27453fde2bb33ab4144a742fa24e37cdc5233576a492129ac57345d462c728a03ec2a21bc6f2284f9cacfc89a4ca953b2d0c008900000000800000000004000f003381c60debfe85587e0bde598d7c431ac4bb85b9ba67ba6ba30b07a9aa6061ab6e2079c718e897724451a273c81525bb859ac2e814c72114d5581ea9be4afd64a09ff66d1a6607df6e16f00807e7f18997c55907c36e78b7fc2c9a1e8c2cc87df0854381bfe33a47843fdf9b84118a5778c31b4329bbb484697d728170c2ed5ba99ee87bc3048cc7f9e5", @ANYRES32, @ANYBLOB], 0x148}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000014c0), 0xc, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB="863100000104010800000000000000000a00000408000540ffe80000080004400000ffff"], 0x24}, 0x1, 0x0, 0x0, 0x4000800}, 0x40448c1) socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4) sendfile(r0, r4, 0x0, 0xa7a4) getdents(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) 04:54:26 executing program 6: syz_io_uring_submit(0x0, 0x0, 0x0, 0xcef) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x9) fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000180)={0xfffffdf3, 0x5, 0x2, 0x8000, 0x9, 0x6}) r1 = syz_open_procfs(r0, &(0x7f0000000100)='timerslack_ns\x00') r2 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000380)={'fscrypt:', @desc3}, &(0x7f00000003c0)={0x0, "46ec3f67545845b4b4e811c9041c1321ecd92f64705b3574d599584b4eccd606d2578689d748d133c4451747efe7c10e4a0965c8393449b3a7786f15d3bc4fb7"}, 0x48, 0xfffffffffffffff9) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffd, 0xfffffffffffffff8, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x40, 0x1f, 0x1, 0x7, 0x0, 0x4, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x209, 0x101, 0x3, 0x0, 0x4, 0xfffffffc, 0x7f, 0x0, 0x10001, 0x0, 0xffffffff00000001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) keyctl$chown(0x4, r3, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) [ 211.225649] 9p: Unknown uid 18446744073709551615 [ 211.286687] 9p: Unknown uid 18446744073709551615 [ 211.404025] EXT4-fs (loop7): unsupported descriptor size 0 04:54:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r2 = getuid() sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000002100)=ANY=[@ANYBLOB="98110000320000012dbd7000fbdbdf251b0000004b6ec08f8f44f4ba2a17cbce1d5245185fc8fd68a0804522e646205266d3173e1540e8a27a09aab5ccdcab8a2de72284e3f36b64a9383dbdd1d4b199cea4373b17ff73b94ff3c4216b7369432e380aecd3cd1315d42f34aa2ff6f0eecd76c234fa7702bb43ed246405adc19850c376327d343655cc9326b7266b6c78d76991e78cb0d052cb378c9f7591c405bc49919e28cfcc53769d1fceea690f96f55e8c56bb66edfdebfadbbf47d8828d9ff837bc002b0dd607cf92029c863de3e57aac93bddfb4b7c504006f00227d7f9e8be984bfdc75b06a71a475bb77cb583d55aa5c7e102380db4580a1c1599907bd8064a162079a07df5adb547f66b1b198257ec3626ce5257354274940881dc02222937d9d946b601d13e38213df97f93ec3567939280c37b9aadb279040e5be3244e3938e6d5c89873a3855ce1560d2a232650c172a9885a06021ab8939a3e4d5941361fe918b7a9d602ba546f1da095f3d53457b450d6fc40e1cf5600cbeb0f63f2afa34f3e2cf33f022b88de6b503cb62d3d257463fd5563d22731426b8bec2933cc2abfc21b6ef9bfe59360fde674a926f925863f8b62948f599f69700e37390306e743f555df4951da062a1bff8aedca71c457ac4ff88296b286f22b3091583d27a4a3005583f6782ab68f85bc2043c5b415f50d747f9c647bbcd8e6fdde010a37cfce1675d158970562c74b4765766cbf6289d161a1dcacfc5bad537b1b2255e1def6ba785ac05ab97e5b86c7ea1f9dbf3326d2de0f91dccee881b461d83186feb4db6520e42068b0a5d5dc9710197dadbcb659dcc7f42ff84c48ea5ef1696ec8f24e3f9b6d7e678817487a244641ab7faa71fe4f14db59f41e52f93541209f31f2126d03a57e692ffe8cb7168e833fdfbcee58cb1736a2c39b7019f05f790833f46c0896e0e602af641283c8dedf63e6cb99ceaee2db2d0f9d038ca22556ff675401afc4979a07a73ce2deccc77994856d9e1b72cc6867da95133f48b2f3a7b1dad0a7f81481ac894f83c7529a73452bce45ac7fbb6cbbd3d1155f647bddffca21ae2dd763f318247e7da6576ac73123f023ac44cd8c11c2e36e02c79dc12754ca055e02e5ec933518532471ad5a93c819a6f09336f31c5870d9523dd2217b552bf8bab828a551df1c9b063ea294042d28c704a2e53c3a84c63f66587f266393de2666d7c275b977eea75403d1495594ffc09086d0aff2fb90a9147c467f898548e137f01043037b3217d29d11768832c482d5e89e5320d233fce8aa3acccc78b682a6f14ebacc0fa4f17d342385c9c9b6ade4629ce2f0cb42fe40c112101573cfd4416884f585717eaab422960a8b471bb4d89c1579595da7f8ddee30ba1947c49bcb0eb1de93e0a8f0837bfed030dd363eddfd6bf6b8ddcbab1fa38bde3f7feb80511b797b524f44cf0bd41d12d725506139807be34cb79dee7bed807dce1877e5897b8e1f5617fcff5d9da55842ebac665546958caf2a374383b5d9ea72486b2a0c7489af1dd2d806858271a7d5915a296d3a549d111ea80388d44faccbd3fb4f4cd5fb7c419d4c1186dbcedbe5c61daf9808a47f62152532226f26273b249baa48eb572b6961471760fe9be42ebcbc2bcf3781fd11fc0ce679aacea8754d1e29a3ba190713c6a81093f8c3a87a792f106f7ee57ea318589f407ead825ecc07e64951d0f47b1813cd129712bd8fbff5ce136643def9a3d477eff543253c8d6988b88e1a8ea947ea6f1f6c616089d6262d66d24564a23f50c2f0d2e4f71435394ed5bed37ea61ce05f63ee82efb4fb09aa3f33e6967aef52c171312b0cfa3b26f035d12a739a79aa7cab335724f33bb6836855e3e5e9eb3b2c3800915d1a1dcc446e79d83205eebe0e962e291f16408e1799c7e14582fef8376af1607162073f77f0d12d6cb18f8c5e5af3ab70c0bc0797941a620d3f250b5ee914acf630bfcb6bb27df547b48a6849b3cfc9b9ef44cb9c3d7fde6383da3aa945332007394ab566d3f7ece3cc2e8703251c3ed2d5ae1412cc98f6438bea061e69032f274c489f95e831e4aee681cfbc9321c7f3274e9ca87d19f1c3f00bb1284969069c32c8a13dbe33a9474a2bbba705017bdb6801004f7146d13b50ed44c3194a392de94068dd1eb58d01744730de071468bec0cae31da162a1d439e91b312075fe986384df5b02b4296c17f99a16e4074bb65415efff9c4b5a73c14272785aebfd706cc7d771922a3487d692dbbea836e0c22a504c9a41ca70910fd189cda221fc589ef1c0df2313333394c7ce040b78944796b27879086cc47a244f7df83beb61799948a191132229b8252c2458ec8e7cefd1dd2620b247fa9471ebcdfc0f9dba4bf25a6ec800c72efc466be0c03bc6eb05989364229128850e0274320fe774b8fab6c0fd50f8c80537e0c7fb8cfa37ef04ed59f8279e9ca156b40bc3e22bc948f327b2e8d583d4355b3547131226d54d2558eee460754020cb4357122541d3a9f128763ab4098a4de50208fdd8cbdcf2a3a71860c85c04242029cce6714cb496b77ad8b12c6f82671cec5da63dc833337e586942f2b14683231fec618a1c373c8843bdaea88da6c9f3cbabb181e4cc4c875692e53e43d79ed6c73765cc918d3df50753af1259153916adf020fdac3501a153a89bf00309a9be22f7993f3536859e72bdb2be4a32d05ef3cebc292b930064a54fdc19e70718139350585c697deb96fdae21849a8a79f0732ffa641a28acc08c8062088ff21ca1eb3e934bc1ac384d1cd81b64f3ce95369d8ec28d0382f589b6be68817b5ac5346cfc26d4a1972e2fb4b8c5aaa583e455e12c5587b1e5733847e34f26556237c9357fe0685556ec86700e55c8685233fce9ca5a374180a68faf3c98f74cffddd9cf082756ebeaf43efc36ae58fa40a31ab1e989899314b7ce0617713e36614667289d75ef96cecf7646f996f1266a9ddd4ecb83668b98029489540d2fff5ee22ae1007ecadc1dea35d7bf6ff3f3d0d9032df8056cd0fa3c0ecfea715084faf9730fb9214163aacd752622f3aeb43c75b1a7bd0e8d4680ecd9b452bd4f0994a6a1a17647170529137d2c7cc16e341b8eeeb67f0ef0834a4015f74a38634f1b1b89c1fcfd9c8606814bb24d5f951bc325a179b932aec455e3df0f955123d1b848b9860b770e7874fc8ec2585f7ba3a512ea60814503632e770ffcdae977f290286641af1855157c217582b6bb5ffd745e8e2516302c2f306c7529e420f6e0ed6036611bda31bbfa7b5d40ac9d81bf5227cea1ca95119edaffe198e46e4ce5ab97672675dba542ec07df70fefd05027bcc8bae3bbfacc4e3f418553b6a0c415725d12460f0d53a35892b1ab41806aa4d43e433dee93a97deb1814e3877cc0817f102d00479521177b1b6d78106e0d2fc07d5c0a5f6e974a72925de6915a4f5376f85ae09371ab483093097530b4af5d398725d53082bd351a06a0011bb1535c2f246161c3b908dc14f4779966c81888821c979f2faa9c197b7d4e45e4d629ec571589902e877d549f4569cb2439b56b2174c884224a29178d991de9e623672bbb8b64ac8ddbe815ec574ae2e5f74026c909b863c13227dc23cbdf5f4bf4b420a2649bcc861f1c8578d795d354924b57623fdb523a8ddb4a184221ba92e08ec848694bac8af46a8bcfaa4aa6e9f13d0da0188937c0d8d9ab6144fc2c02542774a34f1fb9ea414f3a16a7426bb03c26e75441fab8ea83255e0b53867a3bb64f6881712fc6b35c5259c1dadc7fc81720cbb32a2ec598e1c66d935c7ce58bf4d522953307346958db8441d701f656a4c1f8314be51317fc2a2c71782849482fa99d80e8982cc1de439cd8778197015aee61ed6103e2b891c9ab9c00f31faf6f17c71fb2182ab346e449f0cde07d7fcf1af1487290597803ef8c223a8b94a015d300d53b8b2cf5929cba4f6061e9ffca65201aa7f2559b960f8c174bcbed691ae8f2df6629883d8a9390f0dfefb5589db1e77bb9ff2ff673657bc368d1eae692add0e3fa9f93c322142b120468a6b24d1adff7ef7160fdc12652fccf78f83e681a3f9305327abc112f9cc3ba6f67e2012c6d5c86a182bbac3555026945857a1e4afcebba52b75c0543c914e05d505357ab72e56b8ed917cc490157db6923649771da4125928b80ed0f87ea8b6b6bb6dc1b91ea4f17c32e36a71bc6c72bb7971ab933564491f5206b9f83bf232469c9b2d37edcc32586c06b5b2fb4ed5a0913c1dc6e711a624b77daa945c70a78048ebc9ed8447bbd77984b9057db4eb472d8cf2390eaa25324cb244b1f1f2cb0bb494f720d87fa11bcafb2c7b7c1ef617c9a532794447b09b60ea47223818ee532b681a26b0e76065832daa30e0e3e25d38b828a08fc04492eb673c804c02c33f5249bfdce44ab7fc2deec39a2c430ee4eca1979d66a5b9bfe3be5d612a946b15ef07e8fe4484c69f4ade4ed5367a319bb5c9722ced1f75228a1d832ad2d983c9a17c676ac3bc70d8d44374f5b10369af030e11ff4db301718cd825818aca1815214a1a512f2ca5c5264599971cce6b86dc0dd50bfe1090801047e71bec20832dbf4bd020d7450fd7b7846caaad6469d601f191b54ef0c8ad8e212c41d09916d2321348c8f99a0e0fb2c3e473ca143f004f863df330c4cb027d074cfd12edd450a1699c855dbcfb66a20f551bd984875f8ebf2edf2f51f27d29af24f9f2e428763d789b414f6485dc148d84f0f2474ae94a1ce49c11e27a1b99e172494dceebba5a3a573d27b8d5ec231a5ffea3e4cc1d30bf89bd20acfd874547aa788032619ee19303a937e5cb137954b72ed5e75341a78d9716f4b72d4a6767558e7c670f67cbeff197e4174de32575872580d7f9d88d126489b0753f515fe82222cc4965aa7db5ad0af5962626078dc4d3d4bc017e34c9115daf3d454e7249abfbb2fe138172545186493f55c2b3b4e9a6fec4bac45828cc4ad3ad47427078eadf93fb9edc8c7075981bc14de8a3496f0b7cb8b00c07ee5a1a52c131bf872b5d1bb930eceb42b2b60e83bc631c70dafa7e013f4c983230fde5e778f95995995dc25cfcc1e996cc5d7d6c07810e0bdb13fabbe71cab61ba6e73ef621038d894c9b24b3f7252f5893d59bf11d16199d783c513fa78e3ddc9f39052e6effe290619474c6365d75ceb229e77dc41e17ee080a237d0523cd1b8b87271c32687864a2b44140c57e0e8713c0db086ef37c44a7ea9c1b4580e551ca0781214f831c572be4f5e2167ba2d200ddbb640b142149f4a6be2993db05269e38bde9fc27924fc7a767b7222b737f4bccfab0067d9b99838a3e4b142a858019f3fd52e75d0045f7aa3191bb1da497ab2e9de0e7010c63a2a57470ecf5b5d6544c91d11724142524c7d2d7bf6731d797b224fe44bfbd7ac5c97360a50098117e90ba81ac92187f7b6f8530d3d5d38c24145ccf36519ecb35899a27dd416f97e83d1ea06a4f567e1dd159c61361d640f488f902132b95faad6dcfb14390c50f54bf13e32dbf5a0aa1709f3073b3daee036fadd4009ddc289a772d3c1b112d2b38d21f383a5d668ce7f3fc1070fb43f4ee267a76bc60abffc8793ef654bbc76c485b982b1793672ad848b9e5dd63a7870b691ea5b62b72d8fcce8a69b5910900953282ba4f4960e21dff9e59fc9daade9bf2b36472ff4eac3de0d7a14aa08824b7e0176c9e64f2cfb4fc64afba5f9c5a269734723019b459b80004b02f44eecbdf4635f0d5fd008e86ce6a0bca93d10fa704a6f433779df172621293eea3b4c2ec71a6f8522ce4573a81f95499bc25de2ae224afded8ce671aea5cd0dd18585f51d24e31435d592c792ec85315a60877f06af9327ef584ec6fd49ce5c7d3dfbbe299b40c1e0c9e4acb6800dd7ff8bcf1703cfbd915f5cc09b1828494faf6d6eacc62e73d6a99f77204bf47fa5bb57ef2030f9398481a1a18cc92b26eda2616e9dc2c1c9b7a49eaf79bec2d351b84145b41e44cb6423130e0662a8760731b3f46c010988da598bcd36c7194c0c72b5fbb2a7caf47d9663868ec417da47dcab93665c30fe6ccea64f0617f209c1f59279be492e8865f1ba89aba5017a92fa0b16761a8b984f54c71df3dad33ce2cd11639002d0044f8fee6d0ba6f4865eda21bc6c76598da1a35be6122ff8ee722ac76edc567e278cc0d7e1e3c3ed127340b0dde1ec5114c7c17ed82000000334fc1fbd2ee9fb449cb7d5dc3813b1157931ba9b441ab5c4cf8ab766e0698f9ccdb8763143fc8a6dd18093a812abda86c2d7547793608009000", @ANYRES32=r2, @ANYBLOB="0000affde89f9837ea2559c5cfb1670a72d52f30c7104497656a9d71c5e194681b55c8000000"], 0x1198}, 0x1, 0x0, 0x0, 0x40000}, 0x880) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000002c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) fcntl$dupfd(r3, 0x406, r4) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)={0x28, 0x2d, 0xc21, 0x0, 0x0, {}, [@nested={0x14, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x4, 0xb}]}]}, 0x28}}, 0x0) [ 211.539979] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 211.721359] netlink: 300 bytes leftover after parsing attributes in process `syz-executor.3'. 04:54:40 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2f6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:54:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback, 0x8000}, 0x1c) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, @mcast1, 0x2, 0x0, 0x0, 0x400, 0x8, 0x2000040, r1}) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r3 = dup2(r0, r2) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x800) openat(r3, &(0x7f0000000000)='./file0\x00', 0xc0, 0x50) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, r4, 0x10000000) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000118000000", @ANYRES32=r4, @ANYBLOB="0000000100"/16]) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) 04:54:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000280)=ANY=[]) chroot(&(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000003c40)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$tcp_mem(r0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x4800) r2 = openat(0xffffffffffffffff, &(0x7f0000000700)='./file0\x00', 0x24000, 0x84) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r2) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00042dbd7000ffdbdf2503000000240001800500020004000000080006000d000000080006000f0000000f060005004e22000008000300020000000800020007000000040001802c0001800800060000000000060005004e210000060005004e210000060005004e21000008000600020000552a98a2a7e8c3ae20b09133fd4a5c62142fb0039da64ab46acfdda0b368396e056ad1084d85725fd79877a82bc2e3c75cc9695e66a4dfa759c0d45041c022c0996b7ae1768dbaa49351541075b19499304aa6e7f43f7b5d08ff96ec"], 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x800) 04:54:40 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = creat(0x0, 0x0) writev(r1, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x547000, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r6, &(0x7f0000001100)=""/4095, 0xae3, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x1, 0x81, 0x4, 0x4, 0x0, 0x280, 0x2001, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x1, 0x7, 0x400, 0x5, 0x0, 0x20, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x5, r3, 0x2) write(r6, &(0x7f0000000100)="4e684004becb8a69bbce20474f38809efc445cf5d11ec26a68c0b338bdba1cdc6e4ff587c772e7aa8b3c61b0b212b9fb3d68f2ce5e9b7c2613e107d2040cc99c9dca22f930a0cbab06fbb598a76bf3182acc6fa1a9f52f5b32c0276535179aaec8fe46d4834fb14b18d0b2c7db7c095f6f59d779be061d11997fd03a90a5f357bfe1a1d0f57445125ca5615f60dc1cacb1cccfebac6b46ac881c391874deaa24a4c14db344097430fe79661ec67286b42cda67188511318c519066cb03505bf7825e6b43de192f744718", 0xca) write$binfmt_misc(r2, 0x0, 0x0) 04:54:40 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) 04:54:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x4, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioprio_get$pid(0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10, 0x0}, 0x811) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000003d40)=0xfffe, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) listen(r0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000680)={0x0, @l2={0x1f, 0x4, @any, 0x0, 0x1}, @generic={0x2, "57e024fbba407bb59a5b9582ef04"}, @vsock={0x28, 0x0, 0x0, @local}, 0x1, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)='ip6gretap0\x00', 0xc4, 0x0, 0x40}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b", 0x65, 0x400}, {&(0x7f0000010100)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8}, {&(0x7f0000010300)="0300000004", 0x5}, {0x0}, {&(0x7f0000012000), 0x0, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) socket$inet6_tcp(0xa, 0x1, 0x0) sched_getscheduler(0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000040)={0xa, 0x4e23, 0xfff, @private2, 0x8}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000140)="7117ebe8d3f368cb17c4f8f1edecadd303980780eb6a5e2c51f7b573672c2214e2cbe4653b4cca19f6de60", 0x2b}, {&(0x7f00000002c0)="0f0e4fa4cfd22a0bc79dd87529e42169770f2cf1fbe64291afd24e36e1bdf99d55a8ffe5270ea58c9f7e8665bdd2121fcdbb57606d1c620721d160a83d835ee52a09ad9592450ff3d78a6b839e97b0e85cc719a2318261e770348086c7e715438e0b104fc6ac1b43de7132fb517556f494023efd4165a0536dc5fb62f6cf560b49ab1dbd45df94ec2a677117d7f6442c6aaa51fcdedc398c6643f848a6340d1baf5bf385e4c19a4a29acfbff5011313cf847bb7c1b6e74cbdd17cf5de721c6441023120744e09666b17b01f9e36b773c64ef425d1d45c986db7ee4982c5b38", 0xdf}, {&(0x7f0000000180)="3388754427314da8529e2d80194ad40382d8c2794006dbbccafef5b328fb2ebd321e7d0ed7573f04372b09a54dade423ae8b4cc563a6a5c622e12f65e72694646652b7384ff85643607c7968d517dea17f874fd97914b019d8441a56540b26c1c18100fff07bc2d8325a34790e046f4541", 0x71}], 0x3, &(0x7f0000000700)=[@hopopts={{0x20, 0x29, 0x36, {0x3c, 0x0, '\x00', [@ra={0x5, 0x2, 0x81}]}}}, @rthdr={{0x48, 0x29, 0x39, {0x16, 0x6, 0x0, 0x1, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}, @hopopts={{0x1158, 0x29, 0x36, {0x3b, 0x227, '\x00', [@generic={0x5, 0x1000, "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"}, @jumbo={0xc2, 0x4, 0x6}, @calipso={0x7, 0x10, {0x0, 0x2, 0x1, 0x5, [0xdb72]}}, @ra={0x5, 0x2, 0x8}, @hao={0xc9, 0x10, @local}, @jumbo={0xc2, 0x4, 0x401}, @generic={0xc0, 0xf8, "b73579d80818415bab35797803c3ffe29806d205d4a621ba70a1c51a9bd3aec5c8a91862eba62b8ce0b6f4371707456738e841ce051577777f8fbe82b63bb36580179c1423c87d48916399db8c4b069002f9a8f737747cf32cc99a533fdd55217bf39d35a8bb7580d3ba7e2154bd4cb7111e38793e516c3e8925c13412dfc067b16b72e50142009d594e6c5a0b752d91c26deaf2900108e9b621f6d5fbcf63151e4b7d8d2a0693e36e111bf2fc67116632532db70ee70af957042b0383db6c28bdcaf7e7da76daf5688bc44cb6c4279ed640149a264eb9562055af96cb39ca1e3fed0cc436b1bf6f3872af19b924942f6d6ea37489c71362"}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x87, 0xc, 0x1, 0x18, 0x0, [@empty, @mcast1, @private2, @loopback, @private1, @loopback]}}}, @rthdr={{0x28, 0x29, 0x39, {0x84, 0x2, 0x0, 0x1f, 0x0, [@mcast2]}}}, @hopopts={{0x40, 0x29, 0x36, {0x1d, 0x4, '\x00', [@padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3}, @ra={0x5, 0x2, 0x9}, @hao={0xc9, 0x10, @loopback}]}}}, @rthdrdstopts={{0x68, 0x29, 0x37, {0x87, 0x9, '\x00', [@ra={0x5, 0x2, 0x401}, @ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x10, {0x1, 0x2, 0x0, 0x9, [0x9]}}, @ra={0x5, 0x2, 0xb}, @hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @mcast2}, @pad1, @ra={0x5, 0x2, 0x5}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xffff}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x2b, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x1f}]}}}], 0x1340}, 0x22004005) 04:54:40 executing program 4: perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x3, 0x26a881) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x10000, 0x4, 0x7, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x7d39, &(0x7f0000000100), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000000000)) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r6, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r6, 0x0, 0x0}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r7, &(0x7f0000001100)=""/4095, 0xae3, 0x0) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) syz_io_uring_submit(r2, r8, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd=r7, 0x0, 0x0, 0xffffffff, 0xa, 0x0, {0x0, 0x0, r0}}, 0x401) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$loop(&(0x7f00000004c0), 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/3, 0x3}, {&(0x7f0000001600)=""/7, 0x7}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/36, 0x24}, {&(0x7f0000002680)=""/114, 0x72}, {&(0x7f0000002700)=""/31, 0x1f}, {&(0x7f0000002740)=""/237, 0xed}], 0x9, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203, 0x1, {0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x110, 0xffffffffffffffff, 0x8000000) 04:54:40 executing program 6: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/wakeup_count', 0x0, 0x0) readv(r0, &(0x7f0000001480)=[{&(0x7f0000000040)=""/89, 0x59}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) preadv2(r1, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/185, 0xb9}, {&(0x7f0000001200)=""/124, 0x7c}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x4, 0xffff, 0xffffffff, 0x14) syncfs(r0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 225.979694] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:54:40 executing program 3: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x6c) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000040)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0202}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000080)={0x24, @long={0x3, 0x0, {0xfffffffffffe0306}}}, 0x14) bind$802154_dgram(r0, &(0x7f00000000c0)={0x24, @short}, 0x14) ftruncate(0xffffffffffffffff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x10, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x13, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000005c0)=ANY=[@ANYBLOB="0100000001000000180000244521f01d5702a1ae03991f525add86e335f14b4a26ab6c4f9427", @ANYRES32, @ANYBLOB]) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000180)={0x0, 0x3, 0x1000}) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000000100)={0x24, @none={0x0, 0x3}}, 0x14) execveat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x1000) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/time_for_children\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000280)=""/68, 0x44}, {&(0x7f0000000300)=""/202, 0xca}, {&(0x7f0000000400)=""/90, 0x5a}], 0x3, &(0x7f0000000600)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x148}, 0x102) fcntl$setown(r2, 0x8, r3) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x324, 0x0) [ 226.097588] EXT4-fs (loop7): unsupported descriptor size 0 [ 226.136907] EXT4-fs (loop5): re-mounted. Opts: (null) 04:54:40 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x70, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES64, @ANYRES64, @ANYRES32, @ANYBLOB="bb35eb0e6df9a2ae1ea146339753fab76e675e9de7d06cb71e2d1c0eed52919b0d80fd728c1808fbcacf7a85884ad9bfb9735e02680f91cf75ae530d2be1bf47", @ANYRES32]) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1e, 0xc21, 0x0, 0x0, {0x7}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x2, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x0) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r2, &(0x7f0000000500)={0x1f, 0x0, @none, 0x6}, 0xe) r3 = inotify_init1(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) bind$bt_l2cap(r4, &(0x7f0000000140)={0x1f, 0x8, @any, 0x1ff}, 0xe) fcntl$dupfd(r3, 0x0, r3) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r6, 0x1, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x0, r5, 0x0}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_l2cap(r1, &(0x7f0000000180)={0x1f, 0x0, @any, 0xafca}, 0xe) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 226.192508] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 04:54:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xfbffffff, 0x4022812, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x4, 0x1f, 0x79, 0x0, 0x1ff, 0x920, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x3, 0x7}, 0x145, 0x80000000, 0x0, 0x2, 0x4, 0x6, 0x1f, 0x0, 0x3, 0x0, 0xfffffffffffffffe}, 0x0, 0x10, 0xffffffffffffffff, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000180)=""/205, &(0x7f0000000000)=0xcd) 04:54:41 executing program 4: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x81, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x26) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) 04:54:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000280)=ANY=[]) chroot(&(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) write$tcp_mem(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000280)=@md5={0x1, "15f7908058c4afd3a7fb4f3bdd2b1baa"}, 0x11, 0x0) syz_io_uring_setup(0x44ae, &(0x7f0000000100), &(0x7f0000000000/0x12000)=nil, &(0x7f000000f000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, 0x0) 04:54:41 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44010000515ee81f9f1a000100000000c5000000009d1414bb0000000000000000000000040000000100000000000000000000000000000000000000000000000000000000a2b266d708c987298868d1aac07e1c8914adfff1494f00fcc6300abc72e5c9ef38485c507e7469aa7b83d3a795ebbe09179bf376d5fdcabea7163e229bc1ad9874c62aae2de38025e72b360adf39f796079ab9938c96c7d2ef46918866474d3fb0c3ce00a9afb057e926f2d6abb02bd7cad5fe30d6c19d04613adaaa5dfd69803be01a58bff24720d1543073570c08f76c5190f3ada6bcf143efcb2a33693c006079128052b9f272b04f3aa35b9e774b50f70787a118dbe4ee5eecf0dd17535a3449f932d667199485f97c4bfde0952009764f4af21a3a617b31c6289aa64ee5df5358794b89cf79b660d88399f1f01dc69399aa7621422581ea36908834c020b084f3b7187ee79e58be20be821301dd43b86ecff3b64b31a6a7963250f28009cbefd2423b24d1415c0d67be6c529101c2420e81824d970f50da131d6bda4c2af5d9f1f18241e836cb1a4bdd483f59e14557ff3b364be4e5540bd541dbd21facefa8aa3cd3d22a", @ANYRES64=r0, @ANYRES32=0x0, @ANYRES32=r2], 0x144}}, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)) rmdir(&(0x7f0000000000)='./file0\x00') [ 226.562193] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 226.606858] EXT4-fs (loop2): re-mounted. Opts: (null) 04:54:41 executing program 5: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000140)={0x3}) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x11230, 0x0, 0x0, 0x7, 0x1ff, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) read(r0, &(0x7f0000000180)=""/245, 0xf5) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) ftruncate(r4, 0x3) pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)={0x42}, 0x0, 0x18}, 0x0) write$bt_hci(0xffffffffffffffff, 0x0, 0x0) fork() r5 = signalfd4(r2, &(0x7f0000000280)={[0x6]}, 0x8, 0x800) preadv2(r5, &(0x7f0000000540)=[{&(0x7f00000002c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000400)=""/100, 0x64}, {&(0x7f0000000480)=""/30, 0x1e}, {&(0x7f00000004c0)=""/87, 0x57}], 0x5, 0xef, 0x1, 0x2) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000100)={0x401, 0x20, 0x1ff, 0x0, 0x6}) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) write$bt_hci(r1, &(0x7f0000000040)=ANY=[], 0x6) 04:54:41 executing program 6: r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000100)=0x80) getsockname(r0, &(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x80) chdir(&(0x7f0000000040)='./file0\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x9, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000340)={0x0, 0xf7, 0x7, 0x1}) ioctl$FITRIM(r2, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@dev, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@private}}, &(0x7f00000004c0)=0xe8) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', r4, r5, 0x800) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r6, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r7, &(0x7f0000002100)=""/4095, 0xfffffffffffffe46, 0x9) r8 = syz_open_dev$hiddev(&(0x7f0000000940), 0x1ff, 0x400) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000800)="839fea33113fcdf19db1cdbb69c2242c910c1431721b6b9c9bb67df74f90c341139ba20c75f2116f680505edad9ef33c5171addc48756266193d7407e9e9f21d1c44bfe9a32f17665d8a7e6ab14e2be120dcfad567733f00130d765b3d6659e1f042a934cac9c266ae9e7ec2bd8664f81230fcfc0073c1010118478d5f1e14d59759a31eb8ec8bf6f60045bc9afb6a933c68b2c48c64f24243ba605e1ffb75751410a1dd1b515f1e405f939475468af0f600d7db396fc7bcd32140771531eb5d81147805bf3c40c92fd1e003418c8ea56c6be333ffad02b48ed6e57f247a23edc6ff9a04b7ea34b9f784", 0xea}], 0x1, &(0x7f0000000980)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r5}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r2, r0]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r2, r6, r7, r3, r8]}}], 0x78, 0x20085}, 0x4008000) pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x40) [ 226.981034] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=24145 sclass=netlink_xfrm_socket pid=4486 comm=syz-executor.1 [ 232.825289] Bluetooth: hci4: command 0x0406 tx timeout [ 232.952544] Bluetooth: hci3: command 0x0406 tx timeout [ 232.953166] Bluetooth: hci0: command 0x0406 tx timeout [ 232.953761] Bluetooth: hci5: command 0x0406 tx timeout [ 232.954327] Bluetooth: hci1: command 0x0406 tx timeout [ 232.954901] Bluetooth: hci6: command 0x0406 tx timeout [ 232.955479] Bluetooth: hci2: command 0x0406 tx timeout 04:54:55 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) 04:54:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r1, r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) sendmsg$unix(r3, &(0x7f0000000500)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f00000001c0)="61a4c147", 0x4}], 0x1}, 0x0) 04:54:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001300210c0000000014000000fc0200"/32], 0x28}}, 0x0) 04:54:55 executing program 6: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) msgget$private(0x0, 0x8c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r1, &(0x7f0000000340)={0x0, 0x74, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r2, 0x1, 0x0, 0x0, {{0x7e}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) r3 = msgget(0x1, 0x0) msgrcv(r3, &(0x7f0000000380)={0x0, ""/147}, 0x9b, 0x2, 0x2800) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001c40), 0x4) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) getsockopt$bt_hci(r5, 0x0, 0x2, &(0x7f0000000100)=""/215, &(0x7f0000000200)=0xd7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44}, 0x0, 0xd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 04:54:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000240)=ANY=[@ANYBLOB="010000a089bfd53c3df87a000000000263ef09495bc7c65f2b1333975b00b7b7e13ff59a3ecd6ee27b33f90e6704310a804ff23e8a86b92156cd8e", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) 04:54:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2a, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0x41}, @remote}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x2a, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000180)={{0x1, 0x2, 0x1018}, './file0\x00'}) [ 240.913927] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 240.933948] autofs4:pid:4522:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2), cmd(0xc018937e) 04:54:55 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) [ 240.936915] autofs4:pid:4522:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) [ 240.954656] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 240.978311] autofs4:pid:4528:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2), cmd(0xc018937e) [ 240.980974] autofs4:pid:4528:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) 04:54:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x604042, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xe0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x3) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = clone3(0x0, 0x0) clone3(0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r4 = fcntl$getown(r2, 0x9) clone3(&(0x7f00000006c0)={0x100000100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x3b}, &(0x7f00000004c0)=""/213, 0xd5, &(0x7f00000005c0)=""/172, &(0x7f0000000680)=[r3, r4], 0x2}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 04:54:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f800002000400003000000000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f00000002c0)=ANY=[]) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) move_mount(r0, &(0x7f0000000080)='./file1\x00', r1, &(0x7f0000000140)='./file0\x00', 0x17) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/keyboard', 0x210643, 0x245) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x84, 0x2, 0x6, 0x90, 0x0, 0xff, 0x20000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x0, @perf_config_ext={0x8, 0x6}, 0x20, 0x7f, 0x0, 0x9, 0x8, 0x7, 0xb7f, 0x0, 0x48d7, 0x0, 0x8f}, 0xffffffffffffffff, 0xc, r0, 0xa) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x58, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x7, 0x30}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x74}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x2f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x38}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x59}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000081}, 0x40) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x100000001) 04:54:55 executing program 1: ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) setsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000100)=0x62, 0x4) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x18) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{0x3, 0x0, 0xffffffffffffffff}}) write$binfmt_elf64(r1, 0x0, 0x48) ppoll(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280), 0x8) preadv2(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x40, 0x4) sendfile(r0, r0, &(0x7f0000000040)=0xda8c, 0x100) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) 04:54:56 executing program 5: fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@ng={0x4, 0xc, "8d851fc715d28695"}, 0xa, 0x1) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, &(0x7f0000000000)='0', 0x80000, 0xfffffffffffffffb) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x184, r0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x80, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2000}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xcc67}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xb30}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_BEARER={0x24, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'xfrm0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffff7}]}, @TIPC_NLA_MEDIA={0x70, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd34}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x4c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x30}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1359}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8840}, 0xca0b92e335be1931) 04:54:56 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0xfffffffffffffd3c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x180, 0x0) mount(0x0, &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='rpc_pipefs\x00', 0x0, 0x0) chroot(&(0x7f0000000900)='./file0\x00') umount2(&(0x7f00000008c0)='./file0\x00', 0x3) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 241.259414] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 241.276195] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 241.302565] syz-executor.6 (4516) used greatest stack depth: 22912 bytes left [ 241.400508] perf: interrupt took too long (2531 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 04:54:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x40100) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x1400, 0x32) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @empty}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) 04:54:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x604042, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xe0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x208, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, r1, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x3) r2 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = clone3(0x0, 0x0) clone3(0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r4 = fcntl$getown(r2, 0x9) clone3(&(0x7f00000006c0)={0x100000100, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x3b}, &(0x7f00000004c0)=""/213, 0xd5, &(0x7f00000005c0)=""/172, &(0x7f0000000680)=[r3, r4], 0x2}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 04:54:56 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x40049421, 0x7) r1 = msgget$private(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001c40), 0x4) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000340)={0x4, 0xfffffffa, 0x4, 0xfffeffff, 0x16}) msgsnd(r1, &(0x7f0000000040)={0x3, "6bed0dd4cde8a598eb9800c3ef3763b967cfc964c13d7bbd6fde1545a234ea1563fe5adf08"}, 0x2d, 0x800) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x3c, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x20, 0x16, 0x0, 0x0, @str='/proc/sys/net/ipv4/tcp_rmem\x00'}]}, 0x3c}}, 0x0) fsconfig$FSCONFIG_SET_STRING(r5, 0x1, &(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='/proc/self\x00', 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(r5, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x30, r0, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0xc, 0x2a, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_MDID={0x6, 0xb1, 0x7fff}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x4}, 0x4) sendmmsg$inet6(r2, &(0x7f0000004d00), 0x2f, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, 0xffffffffffffffff, &(0x7f0000000380)={0xb}) 04:54:56 executing program 5: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x10000000) r1 = syz_open_procfs(0x0, 0x0) pread64(r1, &(0x7f00000001c0)=""/234, 0xea, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x300000e, 0x11, r1, 0x8000000) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3a73, &(0x7f0000000400)={0x0, 0x200, 0x8, 0x0, 0xfffffffe, 0x0, r2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000003c0), &(0x7f0000000080)) syz_io_uring_submit(0x0, r0, 0x0, 0x8) r3 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0xf1, 0x60, &(0x7f0000000200)=[{0x0, 0x5a}], 0x848b2, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000140)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_connect_ath9k(0x3, 0x98, &(0x7f0000000300)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xa7}}]}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) syz_usb_ep_write$ath9k_ep1(r3, 0x82, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r4, r6, 0x0, 0x80000001) [ 241.572975] netlink: 'syz-executor.3': attribute type 22 has an invalid length. [ 241.616133] udc-core: couldn't find an available UDC or it's busy [ 241.617668] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 241.626350] udc-core: couldn't find an available UDC or it's busy [ 241.627800] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 243.163422] udc-core: couldn't find an available UDC or it's busy [ 243.165025] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 243.171262] udc-core: couldn't find an available UDC or it's busy [ 243.172750] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 04:55:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3, 0x18428c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r0, 0xffff) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ftruncate(r0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 04:55:13 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xea0d, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, 0x0, 0x0, 0x5}, 0x0, 0x0, r0, 0x0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r2, 0xa}) 04:55:13 executing program 6: timer_create(0x0, &(0x7f0000000100)={0x0, 0x33, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) timer_delete(r0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(0xffffffffffffffff, 0x330f, 0x40) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000005200c5d50022844574da2a"], 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x45e3, 0x80) accept(r1, &(0x7f00000001c0)=@pptp, &(0x7f0000000240)=0x80) sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000940)={0x34, 0x1a, 0x1, 0x70bd2b, 0x25dfdbfb, {0xf}, [@typed={0x4, 0x2e}, @nested={0x1c, 0x36, 0x0, 0x1, [@typed={0x14, 0x18, 0x0, 0x0, @ipv6=@empty}, @typed={0x4, 0xf}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x91}, 0xc0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r2) 04:55:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x3c, &(0x7f00000001c0)={0x0, 0x0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYRES16=r1, @ANYRES16=0x0, @ANYBLOB="200029bd7000fbdbdf250c0000000800060008000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4004002}, 0x4000044) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'wg2\x00'}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x4, 0x8, 0x8, 0x7f, 0x0, 0x2, 0x1008, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x3, 0x31, 0x3, 0x8001, 0xffffff01, 0xff7b, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r5, 0x0) fcntl$F_SET_RW_HINT(r4, 0x40c, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xf8, r3, 0x1, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_STA_AID={0x6, 0x10, 0x76a}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x7}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xbd, 0xac, "db4e351231a4f3249b77bb54a9141feee11d23dc18dcc6fa42bb4b510db391a7e40cc92f82cf92ce3d89e89bbcefccab3b94bc79d976b624f0c2127801ddbe302db229db45a978548ff070ffd68b1084ba776d0a23b8cbe3fbfedb3aad3591f7b219bd3e55ce9aff7182a1fe0258d73d29d8cea5cf6a1d78d28d35abd03ae439e4ca4924d0e48fd5f7f08b424d0e4d981c18040f342de2d5b87f4585e2cde9163f18bc88552507cef70e8db0dacde9cce80ac75800029d8bbb"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x44040) 04:55:13 executing program 3: shutdown(0xffffffffffffffff, 0x0) rename(0x0, &(0x7f0000000700)='./file0\x00') r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40081, 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r1, 0x2285, 0x0) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) preadv2(r3, &(0x7f0000000d00)=[{&(0x7f0000000040)=""/122, 0x7a}, {&(0x7f00000000c0)=""/155, 0x9b}, {&(0x7f0000000180)=""/138, 0x8a}, {&(0x7f0000000240)=""/232, 0xe8}, {&(0x7f0000000c80)=""/113, 0x71}], 0x5, 0x2, 0x67a6, 0x2) ioctl$DVD_READ_STRUCT(r1, 0x5390, &(0x7f0000000440)=@manufact={0x4, 0x2, 0x800, "00bc95e1d7c7526002994560cca3cb55b66678e5eaea2741345629a1cec02f007569e0842af897601b10179ce9c733b49449827210b73d70a774f7e48cea1c35a571cf104a8db9faf6c7f7a86647a7a3a4a1740d6e9722cbf84f0d9ec33b9bab22d97351d38686158264793722ee3b2516645cf01a1a9ae08aa9192b0aa2d521be5340caa28d3e9aca95d6c911bf19b56b60b59d718961708152c187c5ec50437a3df5039deb78aa1ff0d0c1dce7ff26bb1fbbd65861e3bd8db8c3eabd654b68db5d517f3cad2b86c70d81f32e2a06e473b6ca25df162c2c9c07bc413dca11294ad0405edf9d6960235bf04a490a886388edae8fe3dc39031f5cf8d64613ce9bd37486c957324e5f11cb734692496a2ea9f4a345751bc9c2fe871e70c7b6611549350cde91af83ff7b1c57a2b3fa51cb7019e32b4a56fc4a3f0f78c41e923aed5cb89ab79fb2b1d7d2264638ec688486438cb5bfcda5bd3336c0eca5c4eb49ec0284e9b1356de8e47797300221dae6b2dc5998e5616720ffc947ec2810b3c85b606781abf15f61154565f58d2492cc6a2c56dffa9ba7ab98278ed6ee13653b779b893d8494c76cebde9bc51ed405e27e8daf3d6a9c0e3a09f155d92887781b7e1d1bdca9c0618f5ed7e0c97917b349b694a3d9005f9a672cd522aee5946b70b962128c7702b069399bf489ddb076c5ea02fe2b9030823c4247a6d22cd8c59b4290c56d47ccfa5167f94e9bf5e66bf4fb99c0585598f1113e111eb23cff6482c3060b77f79a77f71e9a6d8fdf8a7311ef5c2eaf7b102e638b3cd28644c29855f14b30e9c0631ead0c314870a30615de4c1bda467575f75edaf7569a77ba047b8443d96d8c862006bfcc7c21b848904100527b69d39c5caf1c3aa038fec350da5c1cbcdec3def9c83b0fe0e3d5f044685ca4e3da91622fcf098a3d4a827740c771dcfc67298754a2a1601e363c35ba09e0191097ac1cb793653beb39885a70b00457010111f12223bc6d6b8dfc16c29e31e27a0bf6c35b421907f10cd41cedd40709d56d7b8e9e3531c1acebc0a5ad21dc1a18affe006320ea8b5d7c4fca00ba4028f802c97ca82c5b321867ae14d8ec57614c9bc5a8b0b7df20bc38585a32d3cf58ea3f9402c478d84c9312e1660648f67ad131560dc6a4932657afcda99b9d5cbf9c8d8e19798f86e62c1dcf4e4bfcdedefac0cd9d9d21cc692a1eb6b7d5b1b2c1a1a49ea7c3566fa56a9d2cc025332479e61fe3a750e20446ebece96faaa58a355e59fb83205c2b389243ecf8141c4a75ffe7281adb43074b88a501682b32c5153f9b79441306a130d17536eafbc70bfe91bb34cf4488d8624cc4fa287fa60b6502c2cc1a049b0afc6bee5a6240238d5ef0e762791121ed045a939dafdf1dfe996325fd552570887ffc7f3066e857015ee8cf082339375cc0989afe26e125bd66579d44c56c4ffe86507b5155ac7f47ef66629ed7b6b11db00c40ef262f5609733ef55b27370e8fbfea36500ba3e9687232eb9f2f6af04dfbfa79a64cd7bfab080648330776ff4088b0345f436f869f5aea2dbd1155bcd62cb858f694ea8e8ca34c418dc7ee051a1a041f0521abd04a7319f73d8fb902688e58a69c9043e8392ff1ddb95a9f6f7c72d5ca765c809901b9e4da6929e6ab98fdbed606854e05677b5fc04b46c7e77550bb2cac1747774d9f5bb41071a2edfdf7ca48303b65800ae56b1d4254d504555484040c8a6a7ff987cfd65e29c921d6aa356ab1ab3c9c3f493cb3c55b414d31cde83084e2183bc2e173f5872c252ffbc5c97ff6712d5934fdc512575dc5db977bf7d5d0b92fc13fcdfd04bafb59d28aeac0d8d5c105b1d648f07753c1fb731f883d0957b1c56138847f34b9b669511580ccbe523de0abf33ee0ae793d659cb2fae7bb1e546eb3d9c4b805499627618b9d0400ff60fdafaf975cb3a9663eb1efef94676dce8042f0d93f11e93d7fcd25d7535c7a37f57b2835b2aefa0108924efba0390da2d939630b6047eb7fff3395d421a27412fadd589e4673f4e3b86d92c51b8d2451812ce4623b2c5de86894519f6e72e381c8fa39ef43f95bd4c812936794f709556e89f9f1044fc59237da4b40406d74b630f4b558e0ca5a7e85f45968ee2162c5c787123f3165cea19f4998ba73ea99af14de50017ced399b32c65fcc3b0069f2393958c5b8fae29ce59e3de43ff2fe4f603b264190ca1ebf9763cef6d81b3b16e59210c72f53f064e3e877791cdbb836cfc3fa9ca97c8adf27f1d012fffc243a95e10adb0de9d1b375c15d4b94e6e1ff7a2b1a3162fccab6e526e8db185555acdf449e15f9fb8b60185c61fc2f838e9c258ab52ece9a38214b0e8d100da3681e215eee5a2052de65f2568d49744786e56185416a53934f627f3fbb460880e5e399993743cc048549a08f9a4a1e11210fdf0ed031a3c8f44cee83af55bf74948f51126d53e6808915d630a0ec0e31884c3ea8b9eacfbda96501b44c200bb7caf55032ae99324af341291df2183ef4a6b0cb2f0272007dac9589149953e61f01e027627dacb58d5edc892fbe29146b3bce72431ec4e2fb4fb7a03af2c2e94c7d68cf59c2f618eff3e7e06d0e03608ac678b325dc4c7bf5af32b215b65fa9a1bed17292a56e9131a8af0e22b79a91f66e5294c9dfd0ee6546978e0d3d5420649f10c1b9f917351cf824887011a8b4ed165b5db68d8f8d4dbd87d337e49f05873553fe5d0e34638851a273618f59ce5fe148ca149cce089a8f4301a5507404939cf4993b4afa6f9d2a76c40adcbf4607e0e293483194f7756ac3fa8f7e2eb28be0a251d0e70f428d06731a135a02b239ab8a0a79472002e08291a7242c41251cd36185a1b31a32ba3da99897886dc37fc9c4d2a8d1"}) write$P9_RLCREATE(r1, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x8, 0x3, 0x7}, 0x88}}, 0x18) fallocate(r0, 0x44, 0xfffffffeffffffff, 0x4) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000d80)=""/212, 0xd4}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f0000000e80)=""/171, 0xab}], 0x3, 0x3f, 0x81) preadv2(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000380)=""/72, 0x48}], 0x1, 0x0, 0x0, 0x17) unshare(0x48020200) 04:55:13 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) capset(&(0x7f0000000100)={0x19980330, r0}, &(0x7f0000000180)={0xfffffdf3, 0x5, 0x2, 0x8000, 0x9, 0x6}) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/pid_for_children\x00') setns(r1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_SEND={0x1a, 0x5, 0x0, r2, 0x0, &(0x7f0000000040)="30c2294684114d1147f6bbcc0302d18cfc8dc1b638e8b42dfd278bf4221117bcd105d09fcd57d96a8bae5fdf99f59d", 0x2f, 0x4000000, 0x1, {0x0, r3}}, 0x7) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000000)=0x1) 04:55:13 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) 04:55:13 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) 04:55:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xb, 0x30, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) dup2(r1, r2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendmsg$SEG6_CMD_SETHMAC(r3, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, &(0x7f0000000080)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r3, 0x0, 0x0, 0x0, {0x8000}}, 0x8) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x1001000, &(0x7f00000001c0)=ANY=[@ANYBLOB="9c45cb289520a000000000000003ff4477258c59b47e45f5af7c6cc58be2912302a30a941821400c62f07f0d7da90830e4106ca54d64133ef17d282b6c60cfc0d7e9809d843becbf9f45447d1d03292cc66d4f40da3d4f18f164c340d9f2e3cb1be7ade79c63edf5295e9b9f5cf71c3556d8d1d0e0bde6f33ed0e759b269705d1d60e77474c68805ca9675f46ecb4ac49f4f25ff22d3d60e44dda2c3b1e4174ae124b65c9404918e15065591b541ae477b3d69b3e2c5f7dd7905fae3e023"]) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) fcntl$lock(r4, 0x26, &(0x7f0000000140)={0x1, 0x1, 0x6328, 0x81}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'rose0\x00'}) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) 04:55:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="667265657a65722c00343e4d7a6cec79d190afcb802c0b30957aaacd5442bc0041e661c19e7e6f46d3a18e655dba57472a0f94f49c042958b20a689aa34d7516cf6db4290a21be909776f19a1bb74ab7ce5b30cd1bd9f58e662ca8a76311d3a07fce02d1199ded9bbd3a19e0c492b8070ac6011cf76d8f54e5bbffbe6946ef03b3b1dfcc3b1db467d6fc5acddc00d5c943a0094308000000000000b2db70e33c6adc67892488c98505273e25dd916a30e2f1f7b4b76ab37c04cb7bf20bb84b40ca6e6f7b09270dad70840b9e8b61938f8526bc2131e72399a22e1eabd90d694c475e14f9fa9a8284db86b5e79e304a72a958a1d1cb"]) preadv(r1, &(0x7f00000002c0)=[{&(0x7f00000005c0)=""/101, 0x65}], 0x1, 0x61bf, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = fsmount(r0, 0x1, 0x71) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000380)={'veth0_to_hsr\x00', {0x2, 0x0, @private}}) r3 = syz_open_dev$vcsa(&(0x7f00000000c0), 0xfffffffffffffffc, 0x141040) openat(r3, &(0x7f00000008c0)='./file0/file0\x00', 0x42000, 0x40) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, @out_args}, './file0\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000340)={r5, 0x6, 0x81, 0x1}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) shutdown(r6, 0x1) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='./file0/file0\x00', 0x800) 04:55:13 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/110, 0x6e}], 0x1, 0x1, 0x0) preadv2(r0, &(0x7f0000000040), 0x0, 0xfffffff8, 0x9, 0xf) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x7, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) pwritev(r3, 0x0, 0x0, 0x0, 0x0) getdents64(r3, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYRESOCT, @ANYRESDEC, @ANYRES16=r1, @ANYRESDEC=r2, @ANYRES16=r1, @ANYRES16=r3], 0x462) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x20602) fcntl$dupfd(r2, 0x406, r4) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xe, 0x100010, r0, 0x10000000) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r1, @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00./file0\x00']) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfe, 0x400}, 0xc) syz_io_uring_submit(0x0, r5, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1}, 0x4) 04:55:14 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:55:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = inotify_init() pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000cc0)) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0xb, &(0x7f0000000000)=0xba, 0x4) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r6, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000780)={0x14, r7, 0x1}, 0x14}}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') ioctl$BTRFS_IOC_BALANCE_PROGRESS(r8, 0x84009422, &(0x7f00000008c0)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000002080)={{}, 0x0, 0x2, @inherit={0x50, &(0x7f0000000940)=ANY=[@ANYBLOB]}, @devid}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r5, 0xc400941d, &(0x7f0000000240)={r9, 0x40, 0x4}) dup2(r3, r4) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) r10 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r10, r2, 0x0, 0x7ffffff9) 04:55:14 executing program 6: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, 0x0, 0x800, 0x0) [ 259.288905] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 259.291178] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 259.292102] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 04:55:14 executing program 3: unshare(0x20000) unshare(0x20000) unshare(0x4040080) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x7, 0xffffffffffffffff, 0x2) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff8000/0x1000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x2, 0x2, 0x9, 0x1, 0x0, 0x9, 0x1800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80, 0x2, @perf_config_ext={0x200, 0x4}, 0x10000, 0xfffffffffffffffc, 0x8001, 0x7, 0x3ff, 0x8, 0x4b2d, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0x8, r1, 0x9) [ 259.346481] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4625 comm=syz-executor.5 [ 259.352594] ====================================================== [ 259.352594] WARNING: the mand mount option is being deprecated and [ 259.352594] will be removed in v5.15! [ 259.352594] ====================================================== 04:55:14 executing program 6: rt_sigaction(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000100)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x80080, 0x82) fcntl$dupfd(r1, 0x406, r0) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x24, 0x1, 0x3, 0x2, 0xfe2d, 0x0, 0x1d, 0x1}}) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) unshare(0x10000) [ 259.499693] audit: type=1400 audit(1684385714.351:26): avc: denied { associate } for pid=4630 comm="syz-executor.6" name="nvram" dev="devtmpfs" ino=99 scontext=system_u:object_r:syslogd_var_lib_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 04:55:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_POLL_REMOVE={0x7, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x4) 04:55:14 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x2c, &(0x7f0000000000)={0x20087b6}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1b, &(0x7f0000000180)={0x0, 0x0}, 0x10) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)={0x0, 0x3, 0x9, 0x1f, 0xffffffff}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/65, 0x41}], 0x2, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8}, 0x12001) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x20, 0x0, 0x5, 0x4, 0x0, 0x8bc, 0x4000, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x6}, 0x106, 0xffff, 0x6, 0x9, 0x9b58, 0x20, 0xe7e1, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xb, r0, 0x2) 04:55:14 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0x4, 0x1}, 0x6) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x400448ca, &(0x7f0000000040)="fcec800c33047661487569821c16cc3abcdeacfa6141217489ec6a3a7000eef8d3e75e4f5b00006f52698729d8eef85e400ddcd7beb941244e02d38cd77ebd4a08c00ac3b7a40f6b0566237d55aeb2b646846f8f018dfe37f3521b0f9e7db066f186db32e04fd5020443da90764e7f6201697575a1f2f98bf49990f7e478341959159329ece3923a0f3495e8b18d") 04:55:14 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x81baa7a28d91b4d0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)=ANY=[@ANYBLOB="010000fa0000000bc9f3a000", @ANYRES32=r0, @ANYBLOB="071c0000000000002e156db5b548b58d"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x26) kcmp(0xffffffffffffffff, 0x0, 0x6, r0, 0xffffffffffffffff) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e20, 0x35, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) [ 259.722757] EXT4-fs (sda): re-mounted. Opts: (null) 04:55:14 executing program 3: sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) ftruncate(r0, 0x1000003) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x200) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x0, 0x1, 0x2, 0x9}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x6, 0x1, [0x18, 0x0]}]}]}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x4, 0x7, 0x25dfdbfb, {{}, {@void, @void, @void}}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8804}, 0x20000000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x90}, 0x40080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x90391, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000001c0)='.\x98-+*\x00', 0x0, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x7f}}, './file0\x00'}) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x4000844}, 0x0) r5 = accept$unix(r0, 0x0, &(0x7f0000000040)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x11, r5, 0xf06a9000) 04:55:14 executing program 4: geteuid() getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)={@empty, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r2, &(0x7f00000002c0)) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000030003d01000000000000000000000000080001"], 0x1c}}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000340)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)={0xd0000000}) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000140)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000640)={'sit0\x00', r0, 0x29, 0x1, 0x7, 0x4919944c, 0x10, @mcast1, @mcast1, 0x700, 0x1, 0x4, 0x40}}) setresuid(0xffffffffffffffff, 0x0, 0x0) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e22,access=any,uid=', @ANYRESDEC=0x0, @ANYBLOB="366f626a5ff6ae67d33d407b175d7d7d3621262c00"]) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)) [ 259.864342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 259.913966] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:55:27 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x208001, 0x20) clock_adjtime(0x0, &(0x7f0000000100)={0x8733, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, 0x0, 0x4009000) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffb) clock_gettime(0x0, &(0x7f0000000000)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001c40), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 04:55:27 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = fork() ptrace(0x10, r0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000180)={0xfffffdf3, 0x5, 0x2, 0x8000, 0x9, 0x6}) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000100)={&(0x7f0000000080)="e07ee95e2bddba81b8fcdb5846cfd80facd6e394077397ea252040f3d044e03683cc34af1bf2b6cb61c2ede3f52b4710ff4e26d480e1d190829e57750c2a53ba60d76673d598931a93", 0x49}) [ 273.069050] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 04:55:27 executing program 6: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000740)='net/icmp6\x00') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000001e00)=""/4096, 0x1000}], 0x1, 0x4000000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0xffffffffffffffff) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0xc052, 0x84100) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) fallocate(r2, 0x0, 0xa, 0xc000) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f00000010c0)={{0x0, 0x6}, {0x6, 0xb3}, 0x7fffffff}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000001180), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_GET(r2, &(0x7f0000001280)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)={0x44, r3, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xc7}, {0x6, 0x11, 0xe50}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000804}, 0x80) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) fallocate(r4, 0x0, 0xa, 0xc000) ioctl$PTP_PEROUT_REQUEST2(r4, 0x40383d0c, &(0x7f00000010c0)={{0x0, 0x6}, {0x6, 0xb3}, 0x7fffffff}) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000001180), 0xffffffffffffffff) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000200)=0x236e, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000001280)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="04002cbd7000fedbdf250f000000e4e001006e657464657673696d0000000f0002006e657564657673696d30000008000b00c700000006001100500e0000"], 0x44}, 0x1, 0x0, 0x0, 0x20000804}, 0x80) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x140, r5, 0x181, 0x70bd2a, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0xffffffffffffffeb}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}}]}, 0x140}, 0x1, 0x0, 0x0, 0x4009}, 0x4000050) 04:55:27 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000440)={0x160, 0x1c, 0x200, 0x70bd2a, 0x25dfdbfd, {0x19}, [@typed={0x14, 0x87, 0x0, 0x0, @ipv6=@empty}, @generic="fd18ae13386516e716ef6aeaa3033463a3989f32a3ba38bbd85d4029de122869dca06802980350367bc64fe8e704051f1a1a4353fb24e0bd0ab374ed9c35ec372b25aef77426861c9bdc1feb671fdd00b64270f4dae0cc4af763b81ac4f081d4b841702a8c9e692a7864c7ec0e48f3e544", @generic="9d7823cc42b0c82d39cf6d015ca52a0f513b732c1b51ba0e22c6082b1bd7bca75aa2ac661046fb4862073cc5fb3bd9db961a90ca21fe398bc3b02130c4c9d92138161f6a31c7ca918d7926b7136643529b87b2fdd58f42bd4d9ab27e03aee1abbdfcc81d63b5efc0f923a9c406f280b5252d869ade4f265497643ee992d5c965fbe111", @generic="74e7f4fbf18d4f5b37601fc645f132bda1de12c56dab80033ea6ea558a2146170907bb7e3cdc028902312c3197f28fd844fe59887d439f7083941d92", @typed={0x8, 0x21, 0x0, 0x0, @u32=0x81}]}, 0x160}, 0x1, 0x0, 0x0, 0x4000}, 0x4000800) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r1) sendmsg$DEVLINK_CMD_RATE_DEL(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x94, r3, 0x600, 0x70bd26, 0x25dfdbff, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x94}, 0x1, 0x0, 0x0, 0x4048015}, 0x40001) flock(0xffffffffffffffff, 0x2) r4 = socket$inet_udp(0x2, 0x2, 0x0) fchown(r4, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000030003d01000000000000000000000000080001"], 0x1c}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@getspdinfo={0x14, 0x25, 0x10, 0x70bd2c, 0x25dfdbff, 0x4, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x14850) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)) 04:55:27 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000200)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000040)=""/13, 0xd}], 0x1) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x5421, &(0x7f0000000080)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = dup2(r0, r2) copy_file_range(r5, 0x0, r4, &(0x7f0000000040)=0x3a, 0x8, 0x0) accept4$inet6(r5, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0xffffffffffffffe6, 0x800) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020101000470008000f801", 0x17}, {&(0x7f0000010500)="53595a4b414c4c45522020080000ea80325132510000ea80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000b9ea70325132510000ea70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c45312020202020202000b9ea70325132510000ea70325107", 0x9b, 0xa00}], 0x0, &(0x7f0000000140)=ANY=[]) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) 04:55:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000003c0)=ANY=[@ANYBLOB="5c01e11a7e94a95a22c85519ba4a9e7b2747dc9f5539513037e80571ee", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c653000"]) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') r5 = syz_open_dev$vcsa(&(0x7f0000000800), 0xffff, 0x80000) r6 = accept$packet(r5, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000880)=0x14) pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) readv(r4, &(0x7f00000007c0)=[{&(0x7f0000000680)=""/211, 0xd3}], 0x1) io_submit(0x0, 0x3, &(0x7f0000000640)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x8, 0x7, r0, &(0x7f0000000000)="227d98098859912f07bb8bcfa6", 0xd, 0x3, 0x0, 0x2, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x3, 0x1ff, r0, &(0x7f0000000440)="6fcffa17fd25e4a898f8a062812e52dc555d2737c55d35f35224c4253b564e6ac3a1d7baa5cf00d16102d2954b165cc5f19a311217a41fc1ba0ddb84c88929565c72da9b1c02bff3c288e8414174a07e78eba894c73b4ba6f0e3610be7aaf5f2c80f185d718e29d0b4e1154cdd1b45eb481655559e8901f1dc09ec3dd20a2d9384fe895d8c15048c24b32702da4a24ab74018e85fb31c9669b4f128da04251401c23", 0xa2, 0x0, 0x0, 0x2}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8, 0x1f, r0, &(0x7f0000000540)="e60ab823f9cb3cd5debe82a719d2988ebb4a8d66fc3719dafe0456f2ddfb173c9bebec155344955574882d1ec8b5d9ac852a872a866563ed191257759ded8d76eef1dd7022dce6c325269075f5fc5b4e6d9ff9abea5ea95a42610b0fbfbba53bfdada9b34ec7c9c71b6d4815ebb26dd3ef946c2dba114c4b400bfe7fb5205803f9ba3dc7db9b2e78c6689266c882de24ab", 0x91, 0x5, 0x0, 0x0, r4}]) sendmsg$NL80211_CMD_DEAUTHENTICATE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x40, r2, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8001, 0x5}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000}, 0x4000) r7 = signalfd(r6, &(0x7f00000008c0)={[0xf0ea]}, 0x8) getsockname(r7, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x80) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="200028bd7000ffdbdf650b00000008000300", @ANYRES32=r9, @ANYBLOB="0c00990005000000560000000800090005ac0f0008000a00de2a84e80a000600ffffffffffff0000"], 0x44}, 0x1, 0x0, 0x0, 0x24004881}, 0x20000010) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000780)={0x34, r8, 0x4, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x1c, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xa}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x34}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) 04:55:27 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:55:27 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 273.118974] FAT-fs (loop7): Directory bread(block 10) failed [ 273.120280] FAT-fs (loop7): Directory bread(block 11) failed [ 273.142242] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 273.182951] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:55:28 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001880)={'sit0\x00'}) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000001000010000000000000000000000000005000000000000000c00008008001000", @ANYRES32=r1, @ANYBLOB="7dc07f5882428b8bd1bf4c334ea678e9295d791481adc131040127d140d0e99353d6f4044c4f9ed3f18bfe7dc5bab1eb8b71562bf95996681ee5dfd08d38775905e0f2ac589c2242eaf951bb00"], 0x28}}, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'sit0\x00', r3, 0x4, 0x85, 0x0, 0x0, 0x24, @empty, @mcast2, 0x1, 0x80, 0x402, 0xa273}}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) fcntl$dupfd(r5, 0x0, r5) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/udp\x00') sendmsg$GTP_CMD_GETPDP(r6, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x24, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000091}, 0x20000800) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x124, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}}, {{@nsim={{}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x63, 0x3, 0x40003}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x124}, 0x1, 0x0, 0x0, 0x8880}, 0x20000080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8914, &(0x7f0000000140)={'lo\x00'}) 04:55:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)) r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x40, 0x42600) read(r1, &(0x7f00000000c0)=""/199, 0xc7) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0xec0, &(0x7f0000000300)={&(0x7f0000000000)={0x14, 0x1b, 0xb31, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) [ 273.299654] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 04:55:28 executing program 4: syz_mount_image$nfs(0x0, &(0x7f00000007c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000840)=[{0x0, 0x0, 0x1000000000000}], 0x10, 0x0) 04:55:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, 0x0) sendmmsg$inet(r0, &(0x7f0000000500), 0x0, 0x64048001) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="6c6530a605aa547d1a882fed4b79020392b100"]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = dup(r4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={'ip6_vti0\x00', {0x2, 0x0, @local}}) r6 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000540), 0x440000, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000580)=0x0) fcntl$setown(r6, 0x8, r7) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000240)=0xc) sendmmsg$inet(r1, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r3], 0x38}}], 0x1, 0x0) 04:55:28 executing program 6: r0 = syz_io_uring_complete(0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x8) r1 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000be000000000000be252f4500000000000000abe20000000000000000000000000000000000000000000001ec50f7fafa0162", 0x82, 0x8800}], 0x0, &(0x7f0000011e00)) mknodat$loop(r1, &(0x7f0000000040)='./file0\x00', 0x1, 0x1) 04:55:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffe3) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000100)={'ip_vti0\x00', 0x0, 0x7, 0x700, 0x2, 0x6, {{0x34, 0x4, 0x3, 0x1, 0xd0, 0x67, 0x0, 0x0, 0x4, 0x0, @multicast1, @loopback, {[@timestamp={0x44, 0x10, 0x72, 0x0, 0x8, [0xb28a, 0x1, 0xffffffff]}, @timestamp_addr={0x44, 0x14, 0x2f, 0x1, 0x2, [{@multicast2, 0x7}, {@remote, 0x400}]}, @lsrr={0x83, 0x1f, 0xba, [@loopback, @broadcast, @local, @rand_addr=0x64010102, @private=0xa010101, @rand_addr=0x64010101, @local]}, @generic={0x89, 0x3, "eb"}, @timestamp={0x44, 0x20, 0xd0, 0x0, 0x4, [0x1ff, 0x8, 0x1, 0x6, 0x7, 0x800, 0x2]}, @ssrr={0x89, 0x7, 0x37, [@dev={0xac, 0x14, 0x14, 0x1a}]}, @cipso={0x86, 0x4d, 0x3, [{0x2, 0x7, "8cc9d5b8c7"}, {0x7, 0xe, "8dabd59fd801cc47f696bc29"}, {0x7, 0xd, "1e2999a74da3c0c26c45ad"}, {0x7, 0x9, "b11b66d5e9b39b"}, {0x1, 0xc, "5ed548350b33a4866b60"}, {0x2, 0x4, "cdd1"}, {0x5, 0xc, "41cf86455ee5219cb4e4"}]}]}}}}}) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, @xdp={0x2c, 0x8, r2, 0xb}, @nfc={0x27, 0x0, 0x1, 0x2}, @tipc=@nameseq={0x1e, 0x1, 0x0, {0x2, 0x0, 0x1}}, 0x4, 0x0, 0x0, 0x0, 0x100, &(0x7f0000000040)='macsec0\x00', 0x7, 0x9, 0x8}) fcntl$lock(r0, 0x5, &(0x7f00000000c0)={0x2, 0x1, 0xfffffffffffffffd, 0x4, 0xffffffffffffffff}) bind$inet(0xffffffffffffffff, &(0x7f0000001280)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) [ 273.645165] ISOFS: Bad logical zone size 25089 [ 273.687030] ISOFS: Bad logical zone size 25089 [ 273.693008] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 04:55:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:55:28 executing program 7: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x60041, 0x8) 04:55:41 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:55:41 executing program 5: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x1df0}}, './file0\x00'}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000180)) connect$inet6(r0, 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000100)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x8, 0x20, 0x1, 0x0, 0x80}) connect$inet6(r0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000002ec0), 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "15bb6949bc674ed64133723aa6453b9d292123bebbcd37c5097fd53da62c01e266166394afb8d0aca105da30931d140a11973acb9dcc0d8da3a4f6f42444a1948f422c8d8d2d8bba069588783e32b713"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) getegid() perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2692, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000700)) 04:55:41 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:55:41 executing program 4: pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xae3, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/5, 0x5, 0x8) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000280)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000500)={0x1f, 0x0, @none, 0x6}, 0xe) inotify_init1(0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x14a) io_setup(0x1, &(0x7f0000000080)=0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x105742, 0xa) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000180)={0x1f, 0x8000, @any, 0x0, 0x1}, 0xe) io_submit(r1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x7, 0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 04:55:41 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001880)={'sit0\x00'}) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000001000010000000000000000000000000005000000000000000c00008008001000", @ANYRES32=r1, @ANYBLOB="7dc07f5882428b8bd1bf4c334ea678e9295d791481adc131040127d140d0e99353d6f4044c4f9ed3f18bfe7dc5bab1eb8b71562bf95996681ee5dfd08d38775905e0f2ac589c2242eaf951bb00"], 0x28}}, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'sit0\x00', r3, 0x4, 0x85, 0x0, 0x0, 0x24, @empty, @mcast2, 0x1, 0x80, 0x402, 0xa273}}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) fcntl$dupfd(r5, 0x0, r5) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/udp\x00') sendmsg$GTP_CMD_GETPDP(r6, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x24, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000091}, 0x20000800) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x124, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}}, {{@nsim={{}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x63, 0x3, 0x40003}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x124}, 0x1, 0x0, 0x0, 0x8880}, 0x20000080) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8914, &(0x7f0000000140)={'lo\x00'}) 04:55:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:55:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000290000000f000000000000000200000002000000008000000080000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="010000000000050008", 0x9, 0x561}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x1000}, {0x0, 0x0, 0x22000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00c5499200548a16234ee144dcb60415479198479bb9e99a7c842ef2a9a47f66132c"]) 04:55:41 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000280)=0x10000, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x20, 0x1a, 0x69844ea0a6ddcd11, 0x0, 0x0, {}, [@nested={0xc, 0x2, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid}]}]}, 0x20}}, 0x0) r2 = open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x1001) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) fallocate(r3, 0x0, 0xa, 0xc000) ioctl$PTP_PEROUT_REQUEST2(r3, 0x40383d0c, &(0x7f00000010c0)={{0x0, 0x6}, {0x6, 0xb3}, 0x7fffffff}) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000001180), 0xffffffffffffffff) ioctl$TIOCGPTPEER(r2, 0x5441, 0x2587f19d) sendmsg$DEVLINK_CMD_SB_POOL_GET(r3, &(0x7f0000001280)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)={0x44, r4, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xc7}, {0x6, 0x11, 0xe50}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000804}, 0x80) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r4, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}, {@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x1}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x1}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4040090}, 0x4094) [ 286.620040] netlink: 'syz-executor.2': attribute type 16 has an invalid length. [ 286.641542] EXT4-fs warning (device loop1): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 286.684934] EXT4-fs warning (device loop1): ext4_multi_mount_protect:292: Invalid MMP block in superblock [ 286.722893] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 04:55:41 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080), &(0x7f00000000c0), 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x2) [ 294.264533] Bluetooth: hci7: command 0x0406 tx timeout 04:55:55 executing program 7: r0 = io_uring_setup(0x5a4, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_setup(0x3862, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x300000c, 0x13, r1, 0x10000000) r2 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = open_tree(r2, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r4) 04:55:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:55:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200", 0x5b, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x8010, &(0x7f00000010c0)=ANY=[@ANYBLOB="eed7d7bf5e545396acec960ffb88f60107b8c3f3c1aa396415dd0a7ffd01d83bc20ac5b5a833f2bee1ab884cc9e5aa9d75e9a533b157b60ef36ddd5f2608e54fc18466cd8924c42ea18ec33ee387fa021a786ed42b361b8ea3f249d16b74137b53fceee743978648de95e4e635d2aa441265169d303268316997dbf55d2f5105160de26a4e55fe70a20cdd6706cfb95f08ee654aff000000"]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x8) openat(0xffffffffffffffff, &(0x7f0000000b00)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000240), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) openat(r1, &(0x7f0000000140)='./file1\x00', 0x600080, 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/partitions\x00', 0x0, 0x0) connect$inet6(r2, &(0x7f0000001200)={0xa, 0x4e24, 0x6, @local, 0x2f0c}, 0x1c) pread64(r2, &(0x7f0000000040)=""/4117, 0x1015, 0x120000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) fallocate(r4, 0x53, 0x2d0b, 0x8) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) fsetxattr$system_posix_acl(r5, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {}, [], {}, [], {0x8}}, 0x24, 0x0) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES16, @ANYRESDEC=r5, @ANYRESOCT], 0xfdef) 04:55:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000400000000000000000000000000000000feffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a15800"/256]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f00000002c0), 0x4a, 0x61bf, 0x2) flock(r3, 0x6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0xcc, 0x1c, 0xd38865185e4463b1, 0x0, 0x0, {0xa}, [@generic="74e279030942173ef6d9a619f4735ff0c11ceb33af982d1b3763670de7004de67ccacf1ee30584f474f70b1e8a0cc9a10663cdf41304cc296d733886cc1b867a7ac308eb4ff1cadedfd4cfe4de7492d708cec7bd6518234f3d8c95fe4c8e4ebe1e8c27bf463ac2368a48025786a73277f27c95a556b946eabe7ddb5e50b40c0066d507121f549ea6d0f91edb426c0382a143bd0de251a9962e429f28b414604967db", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0xcc}}, 0x80) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) unshare(0x48020200) 04:55:55 executing program 4: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000040), 0x880, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x20, 0x40, 0x9, 0xd2, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x7e8, 0x7}, 0x80, 0x0, 0x7, 0x1, 0xa6, 0x3aa0, 0x4, 0x0, 0xffffff11, 0x0, 0x1ff}, 0x0, 0x8, 0xffffffffffffffff, 0xc) close_range(r0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) 04:55:55 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) execveat(r0, &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000580)=[&(0x7f0000000540)='['], 0x400) r1 = syz_open_dev$mouse(&(0x7f0000000080), 0x1, 0x2800) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x3419f89651ab6128) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000017020007ff002e2f66696c65"], 0x10) r3 = open_tree(r0, &(0x7f0000000300)='./file0\x00', 0x88800) write$P9_RREADLINK(r3, &(0x7f0000000340)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r4 = accept4$inet(r2, 0x0, &(0x7f00000001c0), 0x80000) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 04:55:55 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:55:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="8ec6f0aa526b6fca61cfcfd5ce2d32af5685c9c41f", @ANYRES16=0x0, @ANYBLOB='\x00'/14], 0x14}}, 0x0) 04:55:55 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x8, 0x3, 0x63, 0x7, 0x0, 0xb27, 0x200, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0), 0xc}, 0x4c602, 0x647, 0xff000000, 0x0, 0x5db, 0x1, 0xfffc, 0x0, 0x849c, 0x0, 0x4}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x5) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001280)={&(0x7f0000000240)=ANY=[@ANYBLOB="cec89273a5a382ea8362adc51c0000003f00000426bd7000fedbdf251700000007e2500e26000000"], 0x1c}}, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4000000000000000}, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) fallocate(0xffffffffffffffff, 0x3, 0x4, 0x800) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000280)={0x6, 0xffffff68, 0x4, 0x9, 0xe, "2c7d4ec794556575275b1590ee8a1d035aca0d"}) r4 = syz_genetlink_get_family_id$batadv(0x0, r3) ioctl$AUTOFS_IOC_CATATONIC(0xffffffffffffffff, 0x9362, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001340), 0xc, &(0x7f00000013c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010025bd70e5fddbdf250800000005003800000000050000000000000000000000000000006e10203bc4647b00a85f000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4051}, 0x4824) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = syz_io_uring_complete(0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) dup3(r0, r0, 0x0) [ 300.467239] EXT4-fs (loop5): Unrecognized mount option "î×׿^TS–¬ì–ûˆö¸ÃóÁª9dÝ [ 300.467239] ýØ; [ 300.467239] ŵ¨3ò¾á«ˆLÉåªué¥3±W¶ómÝ_&åOÁ„f͉$Ä.¡ŽÃ>ã‡úxnÔ+6Ž£òIÑkt{SüîçC—†HÞ•äæ5ÒªDe02h1i—Ûõ]/QâjNUþp¢ ÝgϹ_îeJÿ" or missing value 04:55:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xc}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x11, r3, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r4, r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r6 = dup2(r5, 0xffffffffffffffff) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r6, 0x0, &(0x7f0000000240)=""/61, 0x3d, 0x8}, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000003, 0x110, 0xffffffffffffffff, 0x10000000) r8 = syz_io_uring_setup(0x6f10, &(0x7f0000000980)={0x0, 0x10000, 0x0, 0x3}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_BUFFERS(r8, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/214, 0xd6}], 0x1) io_uring_register$IORING_UNREGISTER_BUFFERS(r8, 0x1, 0x0, 0x0) syz_io_uring_submit(r0, r7, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x3, 0x2007, @fd=r8, 0x6d83, 0x0, 0x0, 0x16, 0x0, {0x1}}, 0x8000) sync() sync() sync() [ 300.565629] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 04:55:55 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x3c, &(0x7f00000001c0)={0x0, 0x0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYRES16=r1, @ANYRES16=0x0, @ANYBLOB="200029bd7000fbdbdf250c0000000800060008000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4004002}, 0x4000044) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'wg2\x00'}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) pipe(&(0x7f0000000300)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x1f, 0x9, 0x7, 0x0, 0x0, 0x47e, 0x40200, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000002c0), 0xf}, 0x1342, 0x203a32f8, 0x3, 0x0, 0x7fffffff, 0xfffffff9, 0xb8, 0x0, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0x4, r4, 0x2) socket$netlink(0x10, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) fcntl$F_SET_RW_HINT(r5, 0x40c, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x51, 0x3f, 0x40, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x50021, 0x7fff, 0x1ff, 0x5, 0x6, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x3b0}, 0x0, 0x6, r5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000700)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xf8, r3, 0x1, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_STA_AID={0x6, 0x10, 0x76e}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x7}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xbd, 0xac, "db4e351231a4f3249b77bb54a9141feee11d23dc18dcc6fa42bb4b510db391a7e40cc92f82cf92ce3d89e89bbcefccab3b94bc79d976b624f0c2127801ddbe302db229db45a978548ff070ffd68b1084ba776d0a23b8cbe3fbfedb3aad3591f7b219bd3e55ce9aff7182a1fe0258d73d29d8cea5cf6a1d78d28d35abd03ae439e4ca4924d0e48fd5f7f08b424d0e4d981c18040f342de2d5b87f4585e2cde9163f18bc88552507cef70e8db0dacde9cce80ac75800029d8bbb"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x4004000) 04:55:55 executing program 5: r0 = getpgrp(0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f00000002c0)={0x1, 0x2, 0x0, 0x0, r0}) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f00000000c0)=0x80) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000009, 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_timeout(0xf, 0x0, 0x7) sendmmsg$inet6(r2, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 04:55:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:55:55 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000a40), 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000)={0x5, 0x3, 0xfc01, 0x40, 0x77, 0x3}, 0xc) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10088, 0x0, 0xfffffffe, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$incfs(0xffffffffffffff9c, 0x0, 0x18000, 0x8) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r4, 0x8930, &(0x7f0000000b40)={'sit0\x00', 0x0}) syz_open_dev$ttys(0xc, 0x2, 0x0) syz_io_uring_setup(0xd88, &(0x7f0000000040)={0x0, 0x4aaa, 0x20, 0x1, 0x3df, 0x0, r3}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, &(0x7f0000000100)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000a41f000018000100", @ANYRES32=r1, @ANYRES32, @ANYRES32, @ANYBLOB='./file0\x00']) ioctl$BLKIOMIN(r5, 0x1278, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x101) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) 04:55:55 executing program 3: perf_event_open(&(0x7f0000000740)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0xdd11, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff, 0x5, "f31afa00434ef9bab774bdca0d00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = getuid() mount$cgroup2(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680), 0x2000004, &(0x7f0000000a80)=ANY=[@ANYBLOB='memory_recursiveprot,memory_localevents,nsdelegate,memory_localevents,nsdelegate,blkio,memory_recursiveprot,net_prio,euid<', @ANYRESDEC=r3, @ANYBLOB="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"]) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f00000005c0)={0x0, 0x2000001, 0x0, 0x13, 0x9, &(0x7f00000001c0)="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"}) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r5 = dup(0xffffffffffffffff) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x2007fff, @local, 0x4}, 0x1c) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000800)) connect$inet6(r4, &(0x7f0000000600)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000100)={@mcast1, 0x32}) sendfile(r4, r2, 0x0, 0x9bbb) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 04:55:55 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f0000000380)='./file0\x00', 0x40, 0x21) sendfile(r1, r2, 0x0, 0x100000001) ioctl(r0, 0x61d5, &(0x7f0000000140)="2f9ceca4bfb07dba0e11eba907ff614cc35a341ec2ebf4e4d93e7c3e7656abe4993b443fe487beb70bbbf94937b82b7093a6e6bdb0ebf5004b02e9") r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r4, 0x0, 0x80000001) r5 = syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x92, 0x7, &(0x7f0000001640)=[{&(0x7f0000000300)="2e026f3d0c8e64adaf723a7f829ecf6e4becf391948b8636eda9eb0f5d110e3e8b774cc9cdeba76c2a35e64940fdf0ca0aa743cb20316385f268742d8ccbe5963e", 0x41, 0x2}, {&(0x7f00000003c0)="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", 0x1000, 0x100000001}, {&(0x7f00000013c0)="67081a26f4eda7ec451519d216c6b66979d46b0ed326224e40854efc429a9aa133b6e7414d4c45bce8ec00e217318976601f2e909923cb7c6e5364411448bbe024159c94c9b8ce623184e1a8a90cad89b95ec535a5c26be5eb193d2fe9b1c1fea278aea94e3360ba123b2e5e092880d98b966798e7f29015f4814453749f7b5fa301fd51ff210e84355f5210111bacaf8771c612c20fbeffa998bbe48eab82ddc9c9ce96123a6328", 0xa8, 0x4}, {&(0x7f0000000240)="d0ec28d3e3712015dd0b", 0xa, 0x7}, {&(0x7f0000001480)="3787bf72b94d2581370fe6f2be7f69eb4359809c03f5c9fd8268625e8f359968", 0x20, 0xffffffffffffffff}, {&(0x7f00000014c0)="042696f9ab3d50ea381bcd91855c430f6ef370cd8499a68a7c59bfc12dd3c819337cba72f62e6da9c38ea362a4c2c5b63821ca63dd1423ff41672a163c86134fa9f7fe5e9fbb90c9763b4692d75355940680842790cec162619d1e48250a64a5ed8fd70bf1c8c5c1de3bcbe35cc0b2dd3de431f4b9e1aea1d57c93e33749c3c31c150b60632c5f8ff7431b411d5276bd16bf6473ddf46a7b669c3cc9888da877158bce24191e2b804f73e9ac59edaf3e4590", 0xb2, 0x1}, {&(0x7f0000001580)="0314fd7f6d240e1144ab748c204b883d716b89e8c5d593842bedf082174267aa704c26c5cc93c17ee4105c075d2b1dbef42113ec7f3b0539dab10d73596dd216a940aa7a04839f8cdd87ef5fece0a7760ebcf3696fc197189a3c25aaa275c7eea23a0bb9aa09e96c579995e14e3654827250d137f7b98e7f80ee7d1a6c7cd0829586cade774a060e458146eb10a7c4b0960346f82f294e6392677d607a4559626a886dd27e01c8e9fe78ca5a1dff0dda8323", 0xb2, 0x1}], 0x110006a, &(0x7f00000017c0)={[{@map_acorn}, {@session={'session', 0x3d, 0x2}}], [{@fsmagic={'fsmagic', 0x3d, 0x8886}}, {@seclabel}, {@hash}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}) openat(r5, &(0x7f0000001780)='./file1\x00', 0x442, 0xf57c1ee342b29f50) 04:55:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) 04:55:55 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:55:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) [ 301.383319] FAT-fs (loop7): Unrecognized mount option "iso9660" or missing value 04:55:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000fffffdfd0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000400000000000000000000000000000000feffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a15800"/256]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r3, &(0x7f00000002c0), 0x4a, 0x61bf, 0x2) flock(r3, 0x6) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0xcc, 0x1c, 0xd38865185e4463b1, 0x0, 0x0, {0xa}, [@generic="74e279030942173ef6d9a619f4735ff0c11ceb33af982d1b3763670de7004de67ccacf1ee30584f474f70b1e8a0cc9a10663cdf41304cc296d733886cc1b867a7ac308eb4ff1cadedfd4cfe4de7492d708cec7bd6518234f3d8c95fe4c8e4ebe1e8c27bf463ac2368a48025786a73277f27c95a556b946eabe7ddb5e50b40c0066d507121f549ea6d0f91edb426c0382a143bd0de251a9962e429f28b414604967db", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0xcc}}, 0x80) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) unshare(0x48020200) 04:55:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xc}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x11, r3, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r4, r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r6 = dup2(r5, 0xffffffffffffffff) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r6, 0x0, &(0x7f0000000240)=""/61, 0x3d, 0x8}, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000003, 0x110, 0xffffffffffffffff, 0x10000000) r8 = syz_io_uring_setup(0x6f10, &(0x7f0000000980)={0x0, 0x10000, 0x0, 0x3}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_BUFFERS(r8, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/214, 0xd6}], 0x1) io_uring_register$IORING_UNREGISTER_BUFFERS(r8, 0x1, 0x0, 0x0) syz_io_uring_submit(r0, r7, &(0x7f0000000000)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x3, 0x2007, @fd=r8, 0x6d83, 0x0, 0x0, 0x16, 0x0, {0x1}}, 0x8000) sync() sync() sync() 04:55:56 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 301.878251] FAT-fs (loop7): Unrecognized mount option "iso9660" or missing value [ 315.459698] tmpfs: Bad value for 'mpol' [ 315.461088] selinuxfs: Unknown parameter 'tmpfs' 04:56:10 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0xe16b) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) 04:56:10 executing program 1: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x220001, 0x0) r1 = fsmount(r0, 0x1, 0x8) r2 = syz_io_uring_setup(0x1d, &(0x7f0000000000)={0x0, 0x20, 0x10, 0x1, 0x10036d, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000200), &(0x7f00000001c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x13, r2, 0x10000000) r3 = socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) splice(r5, 0x0, r4, 0x0, 0x2, 0x0) dup2(r3, r2) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000000c0)) 04:56:10 executing program 7: mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='selinuxfs\x00', 0x10000, &(0x7f0000000140)='tmpfs\x00') syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@mpol={'mpol', 0x3d, {'local', '=relative'}}}]}) 04:56:10 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:10 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) 04:56:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) 04:56:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000001140)=[{&(0x7f0000000080)="f2", 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r3, 0x8400941f, &(0x7f0000000140)) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) 04:56:10 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x200001, 0xb9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(r0, 0x6, 0x2e) ftruncate(r0, 0x1000003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r1, 0x0, 0x0) bind$bt_l2cap(r1, &(0x7f0000000100)={0x1f, 0x2, @none, 0x8}, 0xe) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x6}, 0xe) r2 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x4000, 0xa) write$binfmt_aout(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/2741], 0xaae) write$binfmt_script(r1, &(0x7f0000000c00)={'#! ', './file0', [{0x20, ',-'}], 0xa, "1c649cbacd1e3f62d1d03c44adfb5190562b4e48f4c699b3c1cfe0cce75c97db1eed709b2e96b5f564846f01aadd1ee6026623a89b740b219fe7d4cbc57b4a767eae0e75eae475074e75726e45035af03b8dada9c3d76fe8e11b1260b3ad54207efc2533e53de9468c725f28f05ffb9b516429237efb91c18e3b61ddff8144af0d4de75661291198f3531ef89da99af6d589c5fa4a09c5740c662acabec85a7a76cc"}, 0xb0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) acct(0x0) 04:56:27 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:27 executing program 2: getrandom(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000000200", 0x5b, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x8010, &(0x7f0000000280)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x10142, 0x54b614b39b845db9) chdir(&(0x7f0000000040)='./file0\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) pread64(r1, &(0x7f0000000280)=""/171, 0xab, 0x3) pread64(r0, &(0x7f0000000080)=""/98, 0x62, 0x6) setsockopt(r0, 0xff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x143000, 0xa) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0xfdef) 04:56:27 executing program 1: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x42800) mmap(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0, 0x1d012, r0, 0x0) 04:56:27 executing program 7: r0 = syz_mount_image$nfs(&(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f0000006a80), 0x0, &(0x7f0000006ac0)=ANY=[@ANYBLOB="81"]) stat(&(0x7f0000000180)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) utimensat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{}, {0x77359400}}, 0x100) setreuid(0xffffffffffffffff, r1) mount$9p_xen(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1000000, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=xen,afid=0x0000000000000286,noextend,cache=none,access=any,euid>', @ANYRESDEC=r1, @ANYBLOB="2c10"]) 04:56:27 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:27 executing program 5: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) r2 = getpgrp(0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f00000000c0)={0x80, 0x800}) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f00000002c0)={0x0, 0x0, 0x101, 0x0, r2}) dup2(r0, r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0x4, 0xde, 0x0, 0x1, 0x0, r2}) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)={0x44c8, 0x2, 0x0, 0xa74f, 0x2}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 04:56:27 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = syz_io_uring_setup(0xea8, &(0x7f0000000080)={0x0, 0x9bc5, 0x0, 0x1, 0x2b6, 0x0, r2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000040)=0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r3, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r3, 0x8000000) syz_io_uring_submit(r5, r4, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r3, 0x58ab, 0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/38) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 04:56:27 executing program 1: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x5e033, 0xffffffffffffffff, 0x0) fork() ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7}}, './file0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x2) [ 332.672812] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:56:27 executing program 7: ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20000001) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000400)={'sit0\x00', 0x0, 0x2f, 0x38, 0x0, 0xfffffff9, 0x5, @mcast1, @mcast2, 0x0, 0x40, 0x1, 0x8}}) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000080)={'ip6gre0\x00', r1, 0x0, 0x80, 0x1, 0x7, 0x4, @mcast1, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7cbe5c8183529037, 0x10, 0x100, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f00000001c0)={'syztnl2\x00', &(0x7f0000000140)={'syztnl2\x00', r3, 0x29, 0x72, 0x8, 0xffffffff, 0x1, @private0, @local, 0x20, 0x10, 0xffffffff, 0x1000}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)={0xc4, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x14, 0x11, 0x0, 0x1, [@generic="809801a7b0c7dba09475f251c743092f"]}, @typed={0x8, 0x31, 0x0, 0x0, @fd}, @nested={0x92, 0x1a, 0x0, 0x1, [@typed={0x4, 0x6}, @generic="11fd4b89fa85a9d9d95ba408f1ad9097c895c82a43e862c68793e352239f2067998400a69fc652d7549f5a0c4237c2f1442ecb075cbfed07677d0bf090db819175680025353750ec4120c199fd60e73a7fea9ffc20c49013e21501b6012dac481f5ec7686dcdba308d470de03d765429a675a193c40dee0ad0cbfd2c84ca9b4e3fb2", @typed={0x8, 0x80, 0x0, 0x0, @pid=0xffffffffffffffff}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x20008880}, 0x0) 04:56:27 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x1000003f, 0xfffffffffffffffd}, 0x0, 0x0, 0x2000000}, 0x0, 0xfffff7fffffffffd, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = getpid() ioprio_get$pid(0x0, r2) readv(0xffffffffffffffff, 0x0, 0x0) lseek(r0, 0x4, 0x1) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x10000, 0x202000) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000001c0)) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x81, 0x5, 0x7f8, 0x9089}}) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') sendfile(r4, r4, &(0x7f00000000c0)=0xfde, 0x9) read(r4, &(0x7f0000000040)=""/2, 0x2) write(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r5, &(0x7f0000001100)=""/4095, 0xae3, 0x0) sendfile(r5, r0, &(0x7f0000000080)=0x5, 0xae3a) unshare(0x48020200) 04:56:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000950000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f00000002c0)=ANY=[]) mount(&(0x7f0000000040)=@sg0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x882002, &(0x7f0000000140)='*{%,\xbe\'\x00') [ 332.879988] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:56:27 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 332.902343] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 332.902416] FAT-fs (loop4): Filesystem has been set read-only 04:56:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 332.982913] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 333.006066] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 333.007917] FAT-fs (loop4): Filesystem has been set read-only [ 333.037068] sysfs: cannot create duplicate filename '/class/ieee80211/€˜§°ÇÛ ”uòQÇC !' [ 333.038101] CPU: 0 PID: 4968 Comm: syz-executor.7 Not tainted 5.10.179 #1 [ 333.038837] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 333.039718] Call Trace: [ 333.040007] dump_stack+0x107/0x167 [ 333.040399] sysfs_warn_dup.cold+0x1c/0x29 [ 333.040868] sysfs_do_create_link_sd+0x122/0x140 [ 333.041383] sysfs_create_link+0x5f/0xc0 [ 333.041817] device_add+0x703/0x1bc0 [ 333.042233] ? devlink_add_symlinks+0x970/0x970 [ 333.042763] ? ieee80211_set_bitrate_flags+0x202/0x620 [ 333.043338] wiphy_register+0x1da6/0x2850 [ 333.043802] ? wiphy_unregister+0xb90/0xb90 [ 333.044276] ? ieee80211_init_rate_ctrl_alg+0x121/0x500 [ 333.044862] ieee80211_register_hw+0x23c5/0x38b0 [ 333.045421] ? ieee80211_ifa6_changed+0x4d0/0x4d0 [ 333.045944] ? net_generic+0xdb/0x2b0 [ 333.046360] ? lockdep_init_map_type+0x2c7/0x780 [ 333.046866] ? memset+0x20/0x50 [ 333.047218] ? __hrtimer_init+0x12c/0x270 [ 333.047667] mac80211_hwsim_new_radio+0x1ce0/0x4250 [ 333.048216] ? hwsim_send_nullfunc_ps+0x80/0x80 [ 333.048725] ? hwsim_new_radio_nl+0x967/0x1080 [ 333.049221] ? memcpy+0x39/0x60 [ 333.049589] hwsim_new_radio_nl+0x991/0x1080 [ 333.050075] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 333.050638] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x1bb/0x280 [ 333.051345] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xaf/0x280 [ 333.052048] genl_family_rcv_msg_doit+0x22d/0x330 [ 333.052570] ? genl_family_rcv_msg_attrs_parse.constprop.0+0x280/0x280 [ 333.053268] ? cap_capable+0x1d6/0x240 [ 333.053695] ? ns_capable+0xe2/0x110 [ 333.054101] genl_rcv_msg+0x33c/0x5a0 [ 333.054514] ? genl_get_cmd+0x480/0x480 [ 333.054945] ? mac80211_hwsim_new_radio+0x4250/0x4250 [ 333.055495] ? lock_release+0x680/0x680 [ 333.055924] ? netlink_deliver_tap+0xf4/0xcd0 [ 333.056408] netlink_rcv_skb+0x14b/0x430 [ 333.056845] ? genl_get_cmd+0x480/0x480 [ 333.057283] ? netlink_ack+0xab0/0xab0 [ 333.057709] ? netlink_deliver_tap+0x1c4/0xcd0 [ 333.058219] ? is_vmalloc_addr+0x7b/0xb0 [ 333.058689] genl_rcv+0x24/0x40 [ 333.059046] netlink_unicast+0x549/0x7f0 [ 333.059478] ? netlink_attachskb+0x870/0x870 [ 333.059954] ? __virt_addr_valid+0x128/0x350 [ 333.060431] netlink_sendmsg+0x90f/0xdf0 [ 333.060869] ? netlink_unicast+0x7f0/0x7f0 [ 333.061327] ? netlink_unicast+0x7f0/0x7f0 [ 333.061777] sock_sendmsg+0x154/0x190 [ 333.062178] ____sys_sendmsg+0x70d/0x870 [ 333.062607] ? kernel_sendmsg+0x50/0x50 [ 333.063032] ? do_recvmmsg+0x6d0/0x6d0 [ 333.063452] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 333.064027] ___sys_sendmsg+0xf3/0x170 [ 333.064452] ? sendmsg_copy_msghdr+0x160/0x160 [ 333.064949] ? lock_downgrade+0x6d0/0x6d0 [ 333.065821] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 333.067097] ? trace_hardirqs_on+0x5b/0x180 [ 333.068135] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 333.069478] ? __fget_files+0x296/0x4c0 [ 333.070464] ? __fget_light+0xea/0x290 [ 333.071412] __sys_sendmsg+0xe5/0x1b0 [ 333.072333] ? __sys_sendmsg_sock+0x40/0x40 [ 333.073393] ? io_schedule_timeout+0x140/0x140 [ 333.074465] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 333.075619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 333.076719] ? trace_hardirqs_on+0x5b/0x180 [ 333.077633] do_syscall_64+0x33/0x40 [ 333.078392] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 333.079441] RIP: 0033:0x7f0989b95b19 [ 333.080205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 333.083976] RSP: 002b:00007f09870ea188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 333.085537] RAX: ffffffffffffffda RBX: 00007f0989ca9020 RCX: 00007f0989b95b19 [ 333.086992] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 333.088444] RBP: 00007f0989beff6d R08: 0000000000000000 R09: 0000000000000000 [ 333.089911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 333.091367] R13: 00007ffebe12850f R14: 00007f09870ea300 R15: 0000000000022000 04:56:28 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:42 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:42 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2d3043, 0x1f1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x40101, 0x0, 0x0, 0x0, 0x4000007}, 0x0, 0xffffffffffffffff, r0, 0x0) ftruncate(r0, 0x1000003) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x20, 0x0, 'client1\x00', 0x0, "ef7fe2e8b5e5fac6", "937634beeccf2455d1cea2e6fb6dfbfdd68d9718ba8cefd191bfb6e75c0f4986"}) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYRES64=r0, @ANYRES32=r1, @ANYRESDEC=r1], 0xfdef) r2 = fsopen(&(0x7f0000000040)='pipefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x2f, 0x81, 0x9, 0x2, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0xf}, 0x20, 0x80, 0x9, 0x7fffffff}}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={r3, @dev={0xac, 0x14, 0x14, 0x27}, @rand_addr=0x64010102}, 0xc) fcntl$getflags(r0, 0x408) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000100), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x6) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x24, 0x1, 0x3, 0x2, 0xfe2d, 0x0, 0x1d, 0x1}}) r5 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r5, 0x3e60) acct(&(0x7f0000000040)='./file0\x00') unshare(0x40000800) 04:56:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c90000000200000000000020801000470001200f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f00000001c0)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x324c1, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)) open(&(0x7f00000000c0)='./file0\x00', 0x791000, 0x101) r3 = signalfd4(r2, &(0x7f00000001c0), 0x8, 0x0) pwrite64(r3, &(0x7f0000000200), 0x0, 0x0) mq_timedsend(0xffffffffffffffff, &(0x7f00000002c0)="c106e901fad79dbc1e06bda3cb4f0924dedcfbdf47a7682a2922734d15e34d4213a0db86630dd6b5b3a14f28433b838be9b2c98cf00527bf2c75c53e0c8195ccad7663d571f9f204c4ff398f938e", 0x4e, 0x80000001, &(0x7f0000000040)={0x0, 0x3938700}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x4, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000240)=""/72, 0x48) 04:56:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="007da1804886b1655e09966a7e07c44fecf87834ecdbb6650240e9635802006dcb1b3d4462fe59be4c704b17c759b22d78c09367f849dcb8494ee15dcf7d0932dbaed64f8c680c37873c7d65eecdf0eaed8aa6cb52ef5ae7ab358650029cb6832dcf658d3b207a59e9d55e0757fcf48c97ef843f7e"]) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) mkdirat(r2, &(0x7f0000000000)='./file1\x00', 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x100) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000100)={0x9fcf, 0x30, '\x00', 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) unshare(0x48020200) 04:56:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000280)=ANY=[]) chroot(&(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000003c40)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$tcp_mem(r0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x4800) r2 = openat(0xffffffffffffffff, &(0x7f0000000700)='./file0\x00', 0x24000, 0x84) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), r2) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00042dbd7000ffdbdf2503000000240001800500020004000000080006000d000000080006000f0000000f060005004e22000008000300020000000800020007000000040001802c0001800800060000000000060005004e210000060005004e210000060005004e21000008000600020000552a98a2a7e8c3ae20b09133fd4a5c62142fb0039da64ab46acfdda0b368396e056ad1084d85725fd79877a82bc2e3c75cc9695e66a4dfa759c0d45041c022c0996b7ae1768dbaa49351541075b19499304aa6e7f43f7b5d08ff96ec"], 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x800) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0xaf, 0x20, 0x0, 0x2, 0x0, 0x5, 0x20000, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000280)}, 0x50800, 0xb, 0x3f, 0x3, 0x500, 0x0, 0x15, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x4, 0xffffffffffffffff, 0x1) 04:56:42 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:42 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:42 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 347.850886] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 04:56:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000000c0)={0x14, 0x42, 0x69844ea0a6ddcd11}, 0x14}}, 0x0) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/201, 0xc9}], 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0xc00080, 0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, 0x4, 0xa, 0x201, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000050}, 0x801) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14, 0x80800) dup2(r2, r3) 04:56:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:42 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:42 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r1, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/204, 0xcc}], 0x1) fsetxattr$security_selinux(r0, &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) acct(0x0) 04:56:42 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000cc0)=0x2c9) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) fcntl$dupfd(r3, 0x0, r1) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xc8000, 0x0) sendmsg$NFQNL_MSG_CONFIG(r4, &(0x7f0000000c80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10047506}, 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x50, 0x2, 0x3, 0x101, 0x0, 0x0, {0x5}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x7}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x10}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFQA_CFG_CMD={0x8, 0x1, {0x4, 0x0, 0xa}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x15}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x25}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x3}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x4080) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46b87f8f03feffffffffffffff0300060002000000da0200000000000040000000000000000903000000000000040000000200380001002d370800010400000060470f0000000800000000000006000000000000000600000000000000ff070000000000000700000000ffff003f00000000000000a62255c1443ca01e575ffb851672bc38bff5670f14c9af9fb92b98ba98410fb3f1779629109dbf2feeebd0619cb16e667e66e9e697024931d6e6b182a89cf8fe0a1f5303e21864cecff77dcddd7ca7c0a1de65d85849a0dbefe322aa4959fcbce9484dd3eb90d91ddf5730a5dbe437edf8926be1024946e1abcec6d975c68229377edb3e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/2804], 0xafc) getsockopt$inet6_int(r0, 0x3a, 0xd0, 0x0, &(0x7f0000000080)) 04:56:42 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x4000, 0x4a, 0x0, 0x20040, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x101, 0x7e2, 0x5, 0x100000001}) fallocate(0xffffffffffffffff, 0x1, 0x7, 0x0) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) r4 = syz_io_uring_complete(r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x46, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_unix(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x3012800, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x110, 0xffffffffffffffff, 0x8000000) linkat(r0, &(0x7f00000001c0)='./file1\x00', r4, &(0x7f0000000300)='./file0/file0\x00', 0x0) [ 348.166757] audit: type=1400 audit(1684385803.018:27): avc: denied { read } for pid=5035 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 04:56:56 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:56 executing program 7: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x13) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xff}}, './file0\x00'}) writev(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)="2581ba0d90d60e7072c31b169adffedc2d3b5301782df84710a80478c780e579ebab49b65fdf42f31cee2a02496dbc00005bed40e18f577e815ef25121f64c8a2b97ef09f3b2fa488db3e4d0197154e72276590b8ce76f1a44a4d8c80a69f8e81e6e2c9beac256552056d880598237aa23d4dd31dbbaa145319ca840abd63fbbb35df617e1b5ff0b6f585a89f84cf3fd4fb92948f561", 0x96}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0x6) 04:56:56 executing program 1: r0 = epoll_create1(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[], 0x28}}, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="00140562f090ff70eeabbbc55a2295a5133bd9c910c3d3c5807237bb0c758426f9a2affb992cd01fd9cb98805b0719a421cf6c8d80fbdc084c2f97c6fffc695159471a8ca6655cce4a4b85393d02d78a3c00b6083b0bfb1a68e3be7bd4ce4ef344da6079ef8ca1add99a1546c2f05ab6013430c804d786aa532a0b61cf20b8e99cd5204c531f71b4166a859028a5a08af8c643ff98ae2fc1e19f3222bd1bcbc64d73dbe3fcfa6c7010fa12406bd2dcc60db3f12c55cc2194e7b3704d2e5f39da615c7d0a2e1f7ae4840d7c98054de6db65e2ed96fe8cbee6caf0d03d0ce4334175e629a75a771e5945b81d59cf661a9d1bb6b4b080ba1f47136de469a5"], 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000000101010100000000000000000080000008001940000000000600124000000000fd7a6cccfe74aa2efd24ffad2f1c442729c6df"], 0x24}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x1, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8, 0x19}, @CTA_ZONE={0x6}]}, 0x24}}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r3, 0x9e46, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r4, 0xffffffffffffffff, 0x0) r5 = fsmount(r3, 0x1, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r5, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0xcc, 0x2, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_TUPLE_REPLY={0xb0, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0xa, 0x0}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @private=0xa010102}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}]}, 0xcc}, 0x1, 0x0, 0x0, 0x90}, 0x20040000) r6 = epoll_create(0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x40000, 0x40000000000000, 0x1, 0x0, 0xfefffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000200)={0x20000001}) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x30001, 0x148, 0x1}, 0x18) 04:56:56 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:56 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:56 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:56 executing program 2: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x800}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) creat(&(0x7f0000000240)='./file0\x00', 0x49) r3 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x2, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="836acc9659000000100000f8755c2d16b8d1b2a113f86dc76fc7062b2d130afb2c4f576048b47c7a9d7f6bf9c6f01323aa8451763956f499e5250b7c045581c53ab5a8a967b80400eaf600"/97, @ANYRES32=r2], 0x10}}], 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="7ffcffffffffffff5be700", @ANYRES16=0x0, @ANYRES64=r3], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x801) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0x2, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:56:56 executing program 7: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)={0x0, 0x0, 0x9}) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x6, 0x1, [0x18, 0x0]}]}]}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, r2, 0x100, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY_TXQ_PARAMS={0x34, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_QUEUE={0x5, 0x1, 0x81}, @NL80211_TXQ_ATTR_QUEUE={0x5, 0x1, 0x59}, @NL80211_TXQ_ATTR_AIFS={0x5, 0x5, 0x40}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x101}, @NL80211_TXQ_ATTR_TXOP={0x6, 0x2, 0x2}, @NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x7}]}, @NL80211_ATTR_WIPHY_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @NL80211_ATTR_TXQ_LIMIT={0x8, 0x10a, 0x729}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000800}, 0x4041) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x20, 0x4, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xffffffff81000237}, 0x0, 0x6, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:56:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:56 executing program 2: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x800}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) creat(&(0x7f0000000240)='./file0\x00', 0x49) r3 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x2, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="836acc9659000000100000f8755c2d16b8d1b2a113f86dc76fc7062b2d130afb2c4f576048b47c7a9d7f6bf9c6f01323aa8451763956f499e5250b7c045581c53ab5a8a967b80400eaf600"/97, @ANYRES32=r2], 0x10}}], 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="7ffcffffffffffff5be700", @ANYRES16=0x0, @ANYRES64=r3], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x801) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0x2, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:56:57 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:57 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:57 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:57 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 04:56:57 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:56:57 executing program 2: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x800}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) creat(&(0x7f0000000240)='./file0\x00', 0x49) r3 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x2, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="836acc9659000000100000f8755c2d16b8d1b2a113f86dc76fc7062b2d130afb2c4f576048b47c7a9d7f6bf9c6f01323aa8451763956f499e5250b7c045581c53ab5a8a967b80400eaf600"/97, @ANYRES32=r2], 0x10}}], 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="7ffcffffffffffff5be700", @ANYRES16=0x0, @ANYRES64=r3], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x801) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0x2, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:56:57 executing program 1: r0 = epoll_create1(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[], 0x28}}, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000000101010100000000000000000080000008001940000000000600124000000000fd7a6cccfe74aa2efd24ffad2f1c442729c6df"], 0x24}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x1, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8, 0x19}, @CTA_ZONE={0x6}]}, 0x24}}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) lseek(r3, 0x9e46, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r4, 0xffffffffffffffff, 0x0) r5 = fsmount(r3, 0x1, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r5, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0xcc, 0x2, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_TUPLE_REPLY={0xb0, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0xa, 0x0}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @private=0xa010102}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}]}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x4}]}, 0xcc}, 0x1, 0x0, 0x0, 0x90}, 0x20040000) r6 = epoll_create(0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x40000, 0x40000000000000, 0x1, 0x0, 0xfefffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000200)={0x20000001}) openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x30001, 0x148, 0x1}, 0x18) 04:56:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:57 executing program 2: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x800}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) creat(&(0x7f0000000240)='./file0\x00', 0x49) r3 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x2, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="836acc9659000000100000f8755c2d16b8d1b2a113f86dc76fc7062b2d130afb2c4f576048b47c7a9d7f6bf9c6f01323aa8451763956f499e5250b7c045581c53ab5a8a967b80400eaf600"/97, @ANYRES32=r2], 0x10}}], 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="7ffcffffffffffff5be700", @ANYRES16=0x0, @ANYRES64=r3], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x801) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0x2, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 04:56:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:56:57 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 376.142248] audit: type=1326 audit(1684385830.994:28): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5126 comm="syz-executor.4" exe="/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1e17f51b19 code=0x0 04:57:10 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x20008040}, 0x40) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x2, 0xe8, 0x3, 0x0, 0x0, 0x1, 0xc0000, 0xd, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x743, 0x2, @perf_bp={&(0x7f00000000c0), 0x7}, 0x40000, 0x10000, 0x9, 0x1, 0x9, 0x800, 0xfff, 0x0, 0x10001, 0x0, 0x5479}, r0, 0x8, r0, 0x3) readahead(r1, 0x8, 0x9) preadv(r0, &(0x7f0000000840)=[{&(0x7f0000000140)=""/127, 0x7f}], 0x1, 0x1, 0x0) 04:57:10 executing program 7: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="8ab7112bea3f790000000000000000", 0xf, 0x2}, {0x0, 0x0, 0x100000000}], 0x1009040, &(0x7f0000000000)=ANY=[@ANYBLOB="00099c6b00400000000000cdf1e62f9ee772c5"]) 04:57:10 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:10 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 04:57:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:10 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:10 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 04:57:11 executing program 7: bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40800}, 0x20044041) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000001340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRESOCT]) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000001140)=0xa2, 0x4) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000001380)=ANY=[@ANYBLOB="01000000f7a52af4f1bc0566af1957aacb5088360a85cd38cfea67b3f686834aca57e59f981622f6151894d94d126b098e5b962c5a91f176a0f8c3a5dcf2d32fec9ba48270d630833aaf259228cf90cddd2e3a8c6a4b959194ecbdb43b3e0bb0ccb8ce60601185183ae6017a3b601e01f08b939ae2b4c5467743fb86c5ff15ec58d569dd9f41ce8b03f8a634c18270a44ecb1762a5c1ae4fb08d1ee847f06480866161c08dc9e4b7d547377433a702d78d1a3d506f12588a618664af37f9e69072709efe69ee0a88d2fe5fd006a8e3199d66b0ea953afd1e6d6c11515bb041617a18852118935c3d1f9e92b8fb5d9ff710bc8229d10e673eae3ced640fcc974c374ad826a8e6d41321682e3610a8e80b552fedf405cb39a7bed13deeca01ce5ab4599753885a13b5cca0e707ad4056bba4cac9", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001240), 0x2}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_trie\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/213, 0xd5}, {&(0x7f0000000600)=""/229, 0xe5}, {&(0x7f00000001c0)=""/100, 0x64}], 0x3, 0xfc, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @private0}, 0x1c) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/partitions\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f00000010c0)={0xa, 0x4e22, 0x4c, @dev={0xfe, 0x80, '\x00', 0x28}, 0x6}, 0x1c) connect$inet6(r2, &(0x7f0000001200)={0xa, 0x4e24, 0x6, @local}, 0x1c) creat(&(0x7f0000000080)='./file0\x00', 0x40) creat(&(0x7f0000000240)='./file0/file0\x00', 0x23) write$char_usb(0xffffffffffffffff, &(0x7f0000000000)="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"/511, 0x1ff) [ 376.976950] audit: type=1326 audit(1684385831.829:29): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5126 comm="syz-executor.4" exe="/syz-executor.4" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f1e17f51b19 code=0x0 04:57:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:27 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = gettid() r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/usbhid', 0x40000, 0x5) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3, 0xe6, 0xbe, 0x7, 0x0, 0x5, 0x4a9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x7fff}, 0x4000, 0x10000, 0x2, 0x5, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x8}, r0, 0x6, r1, 0x8) 04:57:27 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 04:57:27 executing program 1: rename(0x0, &(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40081, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) ioctl$DVD_READ_STRUCT(r0, 0x5390, &(0x7f0000000440)=@manufact={0x4, 0x2, 0x800, "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"}) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x8, 0x3, 0x7}, 0x88}}, 0x18) preadv2(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000380)=""/72, 0x48}], 0x1, 0x0, 0x0, 0x17) unshare(0x48020200) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2f}}, 0x10) 04:57:27 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x2d, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="280000001800210c00000008000000000200000008000000000a00000c0012000200000000000000"], 0x28}}, 0x0) 04:57:27 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 04:57:27 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:27 executing program 7: ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)={0x6}) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) fcntl$notify(r0, 0x402, 0x8000002a) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x143) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100), 0x161800) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000180)={0x5, 0xf78, 0x4, 0x0, 0x0, [{{r0}, 0x10001}, {{r2}}, {{r3}, 0x3e00000000000000}, {{r4}, 0x7}]}) [ 392.981297] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 393.000475] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 393.001475] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 04:57:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:27 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/igmp\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/103, 0x67}], 0x1) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, &(0x7f0000000000)) 04:57:28 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRES64, @ANYRES64=r1]) r2 = signalfd4(r0, &(0x7f0000000080)={[0x46ff]}, 0x8, 0x80000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000180)={{0x2, 0x4e24, @local}, {0x6, @remote}, 0x20, {0x2, 0x4e22, @remote}, 'vxcan1\x00'}) connect$inet(r2, &(0x7f0000000440)={0x2, 0x4e20, @empty}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) shutdown(r1, 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)={0x800005, 0x0, 0x8000, 0x0, 0xfffffffb}) recvmmsg$unix(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}}], 0x1, 0x120, &(0x7f0000000340)={0x77359400}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x509940, 0x11) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000200)=0x4, &(0x7f0000000380)=0x1) getpeername$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @loopback}, &(0x7f0000000400)=0x10) unshare(0x48020200) 04:57:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 393.759846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 393.760984] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 393.814502] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 04:57:28 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:28 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:28 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:43 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:43 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 04:57:43 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x79) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x40, 0x33, 0x7, 0x1}, [{0x0, 0x0, 0x0, 0x0, 0x4}], "", ['\x00', '\x00', '\x00']}, 0x378) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x102c0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xc8, r0, 0x200, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x5, 0x30}}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x1}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2d4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x29}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3d0}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3a5}], @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x19}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x81}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1d6}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x8a}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xc}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x17}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}]]}, 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x8041) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) tee(r3, r4, 0x80000000, 0x4) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r5, 0x84009422, &(0x7f00000000c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x200a42, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000580), r3) unshare(0x48020200) 04:57:43 executing program 2: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@sha1={0x1, "4215e8674e53384e77a3bcfa98f24cc51cf7d00f"}, 0x15, 0x1) setresuid(0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x7ff, 0x8200) openat(r1, &(0x7f0000000200)='./file0\x00', 0x406241, 0x2) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x24c81, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000080)=ANY=[@ANYBLOB="1dc6227a46b1f698ffed", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 04:57:43 executing program 7: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8a30}}, './file0\x00'}) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e24, @broadcast}, {0x1, @link_local}, 0x0, {0x2, 0x4e21, @loopback}, 'veth1_to_batadv\x00'}) fallocate(r2, 0x0, 0x130f, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) sendfile(r2, r4, &(0x7f0000000240)=0xda, 0x97c) ftruncate(r1, 0x1000003) r5 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, 0xffffffffffffffff) ioctl$SG_GET_LOW_DMA(r6, 0x227a, &(0x7f0000000040)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'xfrm0\x00'}, 0x18) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r1, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x5}]}, 0x14, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:43 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:43 executing program 4: pread64(0xffffffffffffffff, &(0x7f0000000200)=""/141, 0x8d, 0x4) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)='./file0/../file0\x00', 0x11, 0x2) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000003e00)={0x0, 0x0, "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", "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"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000400), 0x8, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "7374bf600a2dbb0a10a4446998c60bc654676f080ecee8672b9b990319e9f34b4c45be9b1cbb8fbe1f4541599e2a8deeedad6067575d671432b4ba4028542704ab850b2cd326bd5a16431e3e06cbefba068d34f999e863befaed31fe2f898bdfe4043148f4d1cc27af274cc202dd9cd92b1891ba85c4048baa5cf0aa7a3d5dbef19adb89a7123a5c5cf1f42650df4c63aa25c0c5f606a072b8c1910206999409a39439cacd824f129adb4177e14f533050e77cfd6b9e760c12899b047feb4c8e5b746e5570db48fc8fafeccf98bad6d99a585091b403666ded97ce43cdf6dd1791052bc149861ea2585dfb28b538cc9fe6ffc5e07182615951fd668085ed124af574a07e3495491f19b1aa2a3b69028ccacd78524d988b224ab17ed905da0b840b4a9939e2af6efdf4221126075a8964d904883db014031e0924681a4ef3795071b256b75002a7df298c87c565b1d8a331e7d0c1000e1d707100917dfe107f87ebea9dca1b708b01cacf1c9f348c0d0fd64aa64193637c7169264d06f613c41be60f39b0cc9d813ae5fca2222832f86f2ae87e883efd48df36d16e6c1ca5c378f6ff0fbace91eb3099d744b16171fcc1ab7d5456392f0878ecf27e8caad7386663de490c3044eed7e7cb83e675716eda0cc09f219aadddd814c88048a7c6cefe69a79f2f7a234cfffbf19ac7a9f6ef59faf2776ac3d636904ec1bda09b1c9d8caeafa918983215d866f5cb6f1088e7e99a43425913d258a3dc8550fcbca3e0bec47503e24d709dd1fd1bb3cd92837d10387a0eebb98aab27950a2a66dc0b9bad3e4ef6393036d64949931ffe6479073790b3b885ac8563d4018e9227d644864c17f048daefbb192d15b56a2a440ad6d4ef5af2ac9904d8b69c64d2368928d7595594e6c3fd23229cb6aa80ec308301b1c94777900d34b1b3eea03dca765036a3f5351551affb585f22541074380b60ca062bf8a8a2324fe61ecad5733aec51e0c5ddc648280556b8a038b5816947b1637ef598cfd134cf9833d875fd23d22f5f74e74a4634d50a3ac908eed128f4297924296d95361b9504c08df4a0603eff93ee34bd45ed12e8d06b8f399fefef4ced732aad15b70f3e276101fa4b5a5c17435d0999b3345ccfe853c955e8b7927c7a171506b8e5b4de8a68cb5e80c3709a0e15643b5772d82d04859133e09fa8ab81ac042e67bc918f2847af14a4eb77c3fcac3132ec1af5a57d85acb9ce91d9d15019904396737ade63df938e6f054f8ee21e8994d45b0801ccd8ae8bda90128cb05eddd297d800412bc01fc5cfdfa9d473641fffc793b513da3f7565a27c4ff3678ac6f71560cc6cc95fb4d20f85b7934cb4a4f614182d331ab53b6a09ff47fc272b6c1f5aaca477bfdfed3fac942d639773b7a5656c526eb595d6fa9d301c425947f37088447cb4400c37750b76eb6c1f7933e43b27224c2fdc053e55125d00ab11428af674f58bd5c3ea1ce4762856afccbd37dd59a5e726f2e5e770bcc8372304fc2a33611234e3b0d411fcae8691e621b64581dc32b3d97c02920877b2c995018dcfff2da8687bc64332cffc3d355931561dc799d169f61d121f242dd3605e3fef8a46bf73998202d6a87671719896c61d729006104bdb7e926020f28260c75c2c754e5f073097d7031567e62cbfcbff541702cdaf498bbfe01e2948e6e164271ca4ab4df68a1569d29d3ce7029c0b58d2a1e6d179fa817ec9df17195c8b83a7a7508f18f0e3d07e8871f331d7a151bc11301c7dce402e6a5fda6f3096df2ddfeb48b3991e055c55d2a071ed66bf378e5c451f849cdbd7951cacad16d6b5734b71db866e77086bfab1797942633ec688d78bb2fccaae2b0e796b852b278bd4a4648d0811293e1bfe68e30b42eb27ac0a4e435e086b4cfeeb9fa539f0d800b6108e4c7b9d7237746770a3f3477646b7c9bfd2bc111679d40bffe221be492ba984df6cd4d7d8f9cbf7185e79804416be68d8a2bfa28e5bec4b57bf5f08eeecafabccd55744e49bb4a7dd1324908d91762b9884e7268d0bb6290be3b51091ae6ccf2ebbd4945dd7913bd38509a00ce38d955909bfa1f3740fc123a12e15b853b59b9b691460afdcda150d39e566a83eaa0c3b7bac9819bdbc7e0a620206be87ff2f8ea8091dbffa014d2f2eb919040a434cdeb3db68adf845d2ba751dc0e1ce4afd8672a5ecf0653b8c672c3265aa236a174185f4b4a291bda664bb79c13f8b6932a831385773898d194d2500b38fbfff8c4acafa5a80dfd3f1f906132885446f9f7ad787dbbdab593661ab1c255df879eaf4ca739deaa11379a5c6b650472257fa54b646b29ceb3dbe27e3584914f9f766bbbcc67abeffebb0df881a42b8671bba930b04d1d7710cc15d546ee69ad40e66f04eb28af8bd17b739e68ad75a239303fb97b18f8f08d2f95bdae0f245ebdfc3ecf555a6fd53f5a35af8b2dd016b227d209fc8323a7576e66a9913a0ad4f19d30d2b6f25ac8b5b6c762e2c68c76f9bd7818adbb3c9b194c09471482ec6898754469076b8674ab9e26b5977a0fa693160f18a01d2f2c362186ff75c205cec261d9e6c431ee672e4056b7e458ef02dca1167d09de5977210461758ed506290477a63c5af0698a1f4edf3bc569692bc9febd5fd641860dd34a6926af47ae7bdd3cce59a5b24b6944075e30ec2f2dbd043ebc57a39eaa5559bc4f21f08198e0daa2e8506b21160c8f9b629ad0e80d5e99e5cf4c4ceefb8d9fe5493ebcb066a647269fef2146f1ed55dac66974446e650e49db26ceb24c16c24885a2d2d011d11ec52d5b7a9c8096314d1dc7c992a1dee70be2fc0cc2d9fc94b0d02d479f6f4bfd3fa20df42568e27c0cea6caa1028d5dfbe6a9657053c06132387f9abfbaf93d9b335b69b168bf7fdaa0a44981dadc3358b50f1b24d390f8858d6775fa838388ff8a69b02bf446028485ba9e0c15731288c186b3cdf2fbc088f13f50e5eecc9b3a058d1369b7a254f11aa81a5fabd862bfd5226ce26e0199ef241badd55ba0d6087e9eb1661111a6afef1caf2bd54832bb5a3e8b864c8af220a8a115746c1646e78471ba2edb7c63fcff7f6be047a5f740525fbe5e259beee146dc2a609d3fd576e826ee1e4fce8ccbf75aa713514bda04ed4086cdd11a770cbe5782bca23f5f3ad8682609d5c5d4e5ca4e117d7423740b41081c6945b446223bb435c6ae2314552b7bf53a8b2c8a7a2a961d17315e0f7a660624b119c89ae81d2214b03cd79bc3eb355bf06811d7186b1f0a7219dd8d4096cb0df940719279357b853bc7c5bcf645aa65c12227859ce0851953fcefa6051f2a31e3666abde9ef1ece3eba658de696edf5d87a7d562dfe1f6bb9ac5e6773bc9069c732683715868cf14825345fb60665982549b9bb7c5b7d934ed0c4d136fa089f8459d473bf1ee678cf88c26f4f5ac681aa6dbe6ef78c26e7a3649ae0574f550f9fc64e8caa14586cbc43d8ec72a3170fc4f6c78fdbd40332c1f35adfc04be68a067f2c03325d624e21fa0e1fa6ea879caa84665bedefcd19759872824a0053a110af2b6099d8ea572b0c81cea39147bb2dca0eaefd4be8c3b59b98c27049f04ae5f3652ade0e1561238296d17979581b93d0ee26464fb5675b968cbc397558207fb1d5365f73994c0c8f2bcae0164e74d602a4856355b214af58b6357b2505779260ec73929eb4fe1047bbc2a125ff6c88718d2b8b8fb9c0d1cb1760748ffc5e4998dbaf8fad99df26b2eaf99bce2541d287b243d7b9cf0ecb25588d14c6228a6cb5413f48e3d07817d258c45ca0ab3494ca5b59f87abdf38e439b4a31d60d9474a52e465f36dd0cd56f00d4e5e563bfc6421b40a7522eb71894a698c19510fa7dc690b6b3f782d88e61ca635d5efd4c9c1725dbf24e0c8e246a2dc979e4750de8347687038f0441858bdf5a06bcba827d8d1327601943ca9fd004c121034fa6e1c8b9eff5da764961f5700eab97380e99b37f302239b528b36f5c9bbebaff25edae48fbe59dd272099af5c695a19b62f64485ba01ae8416c02f04360be933b8ba8a49c6c1188a78c3d36d0c61f61b4002bfeb669e29bbcb306f573528a749b085500c7649aea469fca867da4ca9eaecc75a70f41baeb80bf803402a9066dc1e8243192b78533e0ad590e14fd2bf2ce3ac943ade1fcefd247406785ee387d18e9afe8845481748fbadf4d081e01ecce50ef1fc5b457fa296b833d77390764e2af12f7930c6334476dc4cf45d9f272e364336810c11318bd0a95233005d66fe81a5708ae5fad8c7db17e6d97d2340651f7aa7a36e132a77a7a6206b36a95ccb5a48cb19bd3bb886ff0e77bc76653912149ca85895c4f80c373cbbd4305a91213e8ec5b7b18d8587d723c18f02854556aaaa540935eab2b7470a7c1c40c7e843ac1221a51e92eb05af2342fea7c853a46182c8384612aadb40145b95de565140003468eaca74b38bdf4dc640d0af80c3dd81747652c5fe15ffff8965a150a4ca6a9d9c91d067b4fac49b23cd2041dfdab22126c97d812b67ed638cc65d75d836bf439807cd7cd3cd0e6b30c81983e3f45a00282a14d401d81ac7c5544510dc7d157eeaa18b09df5ec949a22d7342b5b720b2a47251e995410f9b35d90824c1b19beb8575c9efe2aaa2a2011790a1099a924c01ca835fb7cc561eb2310a5331d4d9c4a9ee03a5f1364c17a7f4511c0c1b929c630cc110696f9e94b4107d0b75338fda2c5e0b8d46d19b98071e328f57debd56b4a0a9009913ac41518a08e6fa533edf20db0dc5eff43cd3ead623fc826ac03925490537d6b6a47f27031faa17f9852a3cb72d2088f33d35846a40758e60dab4b3980d032adc3e4faa61ff8aaea6b08bc9705cf097701e9af550fa43ec06c0ae2257927eebcbbbf4a05ad8097597943d6aed8a950ba32bc0d19827539019397e2fffa5f7379ffd7ec266f0c1cd947aab0c9e73c2796bd4c32fa0a0effbc84570efdebd3ac1eb57cc89cdbed91ed43a64cccfeba427a017a07d84acc850a45e2f26639598ed061ea81b60fb1873983591d446129ba8b27a4aef3311292017e3cbc00533824888ef80ef1a85c86a370dc11694d2f455e04ceb8811afa53aac77c65b38703d18167aedcc077c988dd9832ee1999a82c8752b921bceae484c19cee6828eef373c979b5c3f208080c8dcb38c53e384bebed6c41c3b9d6958bd2b952d82d17b262dbf30f90ab5c5d197ccee9f6b6525928b0100ffdeace644e159500495ff5a0ea7df7b9ab63617e3879818e25341e97d839beefdf248222cadd61a5d76b1ff34704bb78656afef7994904da269f973598217edc3be93157185aa15ef225f6471d7786a5e28d0f145b96566e101bf46723486867b9aa90f9eb4d1f5612d4950160c1504a367daf984"}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000002700040028bd7000fbdbdf250f00000005006600000000005e96d885a0a1d8a6160adb826f5cfa96aa15badb5ea5938543dec103e886fcb2a1718b4d4846c96e0e56cba52b56f63ec68f4b5d3dbde762f42894b9d837afcb1512b9c8a33f1dda92560e75416fb51a85468f0802df9ebec8ffc5e08eecece8d51d3873e8f89e8f3d1d75191f6546624c8dbbfd06c14e9f3e60c9408d3787a09e04804782b209e50ff0fe16cec3c07fc21f04ccd0b0413a3b"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {r5}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x0, "46da080096fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000001e00)={0x0, r17, "e741d6a7eb8f77331b7e4216cce5c69b49c51cb0c25efae6913595245df183f3f458f6a12954fa1a7f115f97eefdcde9d0a1ef254bf7c0938849563a07d1741c3d48e5592c7f18dd25feb840afb707f9e3666948dae91d95b3665d276079a9ab08a0805a8b95d35f6027c458c5a957c14206cfcfd6c4d2622f3c43baf6a78b63afe0d46fc1148033b4e800e46ffddd8cfab443153db7a2eecdf0364664a926054b777c915b3d267c2f679afb22d688f09a145c4f6a44ee639e16f597cca74ec6f2660fb7bafd42d861ca934bd2f2cb80bdfe93e905bd1e3541791663d515aab777eaf22e4d3741f0c9ec8ad37d5d3208f5f2127ef667ff0881d84e3f1919e190", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000d00)={{r15, 0x6, 0x3, 0xbc77, 0x3, 0xe26a, 0x1, 0x4, 0xfffffffa, 0x2, 0x4, 0xfff, 0x4, 0x1fd, 0x3}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063800)={0x84, [{}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r14}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r16}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r19}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x2, "7c1793b29af822"}) ioctl$DVD_READ_STRUCT(0xffffffffffffffff, 0x5390, &(0x7f00000004c0)=@bca={0x3, 0xbc, "1df7b2d0b3c2b6beaf6f141a1eda086c238d11ae18ddd0843385545923e96246f1441b511152185190dfba34c506ee9d74a1681f9337360dc80b97ad383e52f5fcf9fd7dfdb4908fc88a32daafbf121f99adf3ab3ed0bb659df1d161fa84c629aa3e3cea981b635678af414d6ba71e0aab74087e324b00ec826fcd5bb2fe0c7a21ca35002f997ef5187842166ddc79b994a831b5461ffb5a76e6c43807977a604dcfa9627972b01b5a9644a54d61d7535468785673f89d6190a650d7"}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r20 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r20, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c0000000000000000040002000800000000241d00"], 0x1c}}, 0x0) 04:57:43 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)={0x644, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x630, 0x0, 0x0, 0x1, [@generic="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", @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x644}}, 0x0) r2 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)=0x0) io_uring_enter(r2, 0x76d3, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2c0000, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x1277, 0x0) pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[@ANYRES64=r3, @ANYRESDEC, @ANYRESHEX, @ANYRES64=r5], 0xfec4) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000340)={0x6480, 0x5}, 0x18) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0), 0x80, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r6, 0xc018937a, &(0x7f0000000400)={{0x1, 0x1, 0x18, r7}, './file1\x00'}) sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000b00)=ANY=[@ANYBLOB="408000000e06010200000000000000000c000006050001000700000005000100070000000900020073797a300000000005000100070002000500010300000000c068587a3130e74c2093fa16fa58a331d43d48e1ca224d52c01cc2015f9d21e9242b9c8bf12f052cbec67692c0fe6462dcb6fcfe0aec3b9b8c0cc8d408aaa566fc8d8e0956340773339ed60ec4fba3eb5acdc03dd3615315b53486f0726c3afdb44cd13d8a11deb9ed"], 0x40}, 0x1, 0x0, 0x0, 0xc001}, 0x4000012) open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x88801) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)=0x80, &(0x7f0000000240)=@x25}, 0x5) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ff8000/0x7000)=nil, 0x7000, 0xa, 0x1}, 0x0) fallocate(r4, 0x0, 0xfffffffffffff09f, 0x9) 04:57:43 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:43 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 408.769037] netlink: 1568 bytes leftover after parsing attributes in process `syz-executor.2'. [ 408.868180] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 04:57:44 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:44 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:44 executing program 7: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "f31afa00434ef9bab774bdca0d00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x7fffffff, 0x1, 0x8, 0xd242, 0xac, 0xffff}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) [ 409.490007] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 04:57:44 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:44 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:44 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:44 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x6985) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) capset(&(0x7f0000000100)={0x19980330, r1}, &(0x7f0000000180)={0xfffffdf3, 0x5, 0x2, 0x8000, 0x9, 0x6}) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x83, 0x5, 0x9, 0x0, 0x18, 0x4c8, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3f, 0x4, @perf_config_ext={0xfffffffffffffffe, 0x7432}, 0x800, 0x7, 0x1, 0x3, 0x6, 0x0, 0x6, 0x0, 0x80000000, 0x0, 0xffffffffffffff7f}, r1, 0xc, r0, 0x8) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000001000010000000000000000000000000005000000ff7f000000000000040014"], 0x24}}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) r3 = fsmount(0xffffffffffffffff, 0x1, 0x8) r4 = socket(0xb, 0x1, 0x7fffffff) fchdir(r4) sendmsg$DEVLINK_CMD_SB_GET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="000000007556d40c117f34d567bf1823f66784ceee914cd0ac4ad34662878f74781256b5cebd465219ce", @ANYRES16=0x0, @ANYBLOB="040029bd7000fddbdf250b000000080001007063690011000200303030303a30303a31302e300000000008000b00e5eeffff0e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00020000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ff0700000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0002000000080001007063690011000200303030303a30303a31302e300000000008000b0005000000"], 0xd4}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) [ 409.815237] device wlan1 entered promiscuous mode 04:57:44 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x405e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x9}, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x5dea, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r2}, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000040)={0x60000000}) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000340)={r4, 0x1, 0x6, @local}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x6) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) clone3(&(0x7f0000000140)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$FITHAW(r0, 0xc0045878) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80743, 0x88) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r6}, 0x0) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_FILES_UPDATE={0x14, 0x2, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0xffffffffffffffff, 0xffffffffffffffff, r6, r0, 0xffffffffffffffff], 0x5, 0x0, 0x1}, 0xa0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 409.830621] audit: type=1400 audit(1684385864.682:30): avc: denied { block_suspend } for pid=5280 comm="syz-executor.2" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 04:57:57 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:57 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:57 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sync() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfd63) sync() sync() 04:57:57 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000a40), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040)={0x1f, 0x0, 0xfc01, 0x40, 0x77, 0x3}, 0xc) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11088, 0x0, 0xfffffffe, 0x1, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x100, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xae3, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x4, &(0x7f0000000100)=0x7ff, 0x4) r6 = syz_io_uring_setup(0xd88, &(0x7f0000000300)={0x0, 0x4aaa, 0x987ca35808c768b0, 0x4, 0x3df, 0x0, r3}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r7, &(0x7f0000004d00), 0x2f, 0x20040000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r5, @ANYRES64=r1, @ANYRESOCT=r6, @ANYRES16=r1]) ioctl$BLKIOMIN(r8, 0x1278, &(0x7f00000001c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x83, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x101) ioctl$LOOP_CTL_ADD(r9, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) 04:57:57 executing program 7: syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)={[{@sbsector}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x3f, 0x40, 0x8, 0x80000001, 0x81, 0xd4}) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x40000, 0x54) 04:57:57 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ftruncate(0xffffffffffffffff, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r3, &(0x7f0000000140)=ANY=[@ANYRESDEC], 0x5c000) dup2(r1, r3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x1eb9}}, './cgroup/cgroup.procs\x00'}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="01000000000000002e2f66696c653400"]) openat(r5, &(0x7f0000000200)='./file1\x00', 0x1, 0x53) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x80000) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x4080) r6 = openat(r2, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x100000001) utimes(&(0x7f0000000040)='./cgroup/cgroup.procs\x00', &(0x7f0000000180)={{0x0, 0x2710}}) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r7, &(0x7f0000001100)=""/4095, 0xae3, 0x0) dup2(r7, r4) 04:57:57 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 423.191663] ISOFS: Unable to identify CD-ROM format. 04:57:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x101000, 0x10) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@FILEID_INO32_GEN_PARENT={0x10, 0x2, {{0x0, 0x8}, 0x80000000, 0x8}}, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x800, 0x40) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}]}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000300)={{0x2, 0x0, 0x56, 0x2, 0x50}, 0x400, 0x7, 'id1\x00', 'timer1\x00', 0x0, 0x7fffffff, 0x5, 0x0, 0x1}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x107142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20d315) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) unshare(0x48020200) 04:57:58 executing program 7: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) readahead(r0, 0x7, 0x401) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8800000) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000300), 0x18054c1, &(0x7f0000000440)=ANY=[@ANYBLOB="7472617f203d000000000000000000000092484c1a31dcb9d86c78e32c18e7bb86000000", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',smackfsroot=/proc/timer_list\x00,smackfsfloor=9p\x00,\x00']) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x64, 0x2, 0x0, 0x80, 0x0, 0x800000002, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x0, 0x3e}, 0x0, 0x7, 0xffffffffffffffff, 0x0) shutdown(r1, 0x0) openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0xc000, 0x2c, 0x13}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080), 0x1048018, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c64666c747569643d793203695982522794c68a1a5c18772df34cf7417310080611ab0ef511d504000be683fa000074d694b8bd3ff35f12", @ANYRESHEX=0xee00, @ANYBLOB=',smackfsdef=,\x00']) r4 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x320c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7, 0x0, 0x0, 0x0, 0x2}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000004c0)) 04:57:58 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:57:58 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:58 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:58 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:57:58 executing program 7: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000440)={[0xee00000000000]}, 0x8, 0x80000) ioctl$CDROMPLAYTRKIND(r0, 0x5304, &(0x7f0000000480)={0x0, 0xa1, 0x7f, 0x6}) r1 = syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(r1, &(0x7f0000000400)='./file0\x00', 0xb00, 0x1a0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000080)="28ba4ab7453959ed1d265bd1bbe12c36469ab97e58594bfd7426f50e7a516034afcdc79c4682c0b2229bcc0cd12c7bd1ce984965b2d7f56bb3592f216cb99ef65aa0a305a848a7e8463cbedc5846907ad91ffd3bbf63ba5e835802551d4bf0fcc7bde82e88c42fb06014fb1132cf116c5e21a662a97c808408a0b0eb418fd687fd0562b2778d74b3034ae6270a954a0f5b7e390a66066cc91d4e3383c8edb7b6d86f3be6765335147070e88f2f39c1972682bdefadccfad1f2", 0xb9, 0xb94}, {&(0x7f0000000140)="fa514e24b71fcb749a280beb0326d9499c62b8740798037e00bef93e44166a726edd08ee", 0x24, 0x1}, {&(0x7f0000000180)="549fc4494a26550e8396fe35ab06e675f82ab2aa771806614ceeb52826a4e52806418ffadd164a55735768146dd0f51c0d59df3ff3968a7635b1d6c78a49aa5db25319852c93e44fd4cc395d17a2f7c897367d4d3273a2fa5acd7338c4fa5b4fb8cf948e5f53", 0x66, 0x7}, {&(0x7f0000000200)="85f34e747f7f47e3f87a5042397a08359b0aae4b66f7fc987a1f782a13c318b4528e851721a540060db695426ddf2b120949dbe579129796389ac6444e4b620b2798cd06f826bb0b7a8e4fc01407fe261fbfa7ba99e0f231033c62b5a60edb05dc5c72826f695f72c997ff04e74e2b9760d77dddbf198f522185ac56c9e6f33f9ef98b572296443f3f5507e9eb8dee061aa60aea5bef5ce8c8973b948c1e2bcefe85495fe7e710647b020fe7f00fe261c3eda2fb", 0xb4}], 0x100000, &(0x7f0000000340)={[{@utf8}], [{@fsname={'fsname', 0x3d, 'permit_directio'}}, {@permit_directio}, {@subj_type={'subj_type', 0x3d, '+#\n-'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_lt}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x35, 0x37, 0x30, 0x35, 0x66, 0x34], 0x2d, [0x33, 0x36, 0x36, 0x65], 0x2d, [0x61, 0x63, 0x901fc15064569480, 0x65], 0x2d, [0x39, 0x38, 0x36, 0x66], 0x2d, [0x36, 0x37, 0x37, 0x34, 0x63, 0x66, 0x62, 0x5e]}}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) 04:57:58 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @local}, &(0x7f0000000080)=0x80) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, '\x00', 0x22}}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @rand_addr=0xe4010105}}}, 0x108) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00'}) 04:57:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x543, 0x0) close(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') clone3(&(0x7f00000000c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) r2 = epoll_create1(0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000003c0)={{r4}, 0x6, 0x5, 0xfffffffffffffff9}) mount$9p_fd(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trins=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) syz_io_uring_setup(0x482d, &(0x7f0000000140)={0x0, 0xb454, 0x20, 0x1, 0x138, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000200)) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r8, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r8, 0x0, 0x0}, 0x0) r9 = accept4$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @private}, &(0x7f00000002c0)=0x10, 0x80800) syz_io_uring_submit(r5, r7, &(0x7f0000000380)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd=r9, 0x1, 0x0, 0x4, 0x4, 0x1}, 0x9f10) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_FSSETXATTR(r10, 0x401c5820, &(0x7f0000000040)={0x3, 0x11, 0x4, 0x2, 0x1}) 04:58:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:11 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:11 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000002c0)=@updsa={0x148, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, @in6=@private0, {}, {0x80000001}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}]}, 0x148}}, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x274d}}, './file0\x00'}) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x1, 0x6, 0x101, 0x0, 0x0, {0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004801}, 0x8001) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x34, r3, 0xb0b, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000014}, 0x4000) r6 = fsmount(0xffffffffffffffff, 0x1, 0x8a) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r7, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r7, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)="cb5c", 0x2}], 0x1}}, {{&(0x7f0000000480)={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000800)=[{&(0x7f00000004c0)="2ce1", 0x2}], 0x1}}], 0x2, 0x0) sendfile(r7, r6, &(0x7f0000000200), 0x9) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(r8, 0x40047211, &(0x7f00000000c0)) write$P9_RREADLINK(r8, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) 04:58:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:11 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="28000000100001000000f300000000000000000003000000", @ANYRES32, @ANYBLOB="0c000280080021"], 0x28}}, 0x0) [ 437.061255] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 04:58:11 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:26 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:26 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:26 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:26 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_SEND={0x1a, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0, 0x10}, 0x8001) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) openat2(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000001880)={0x8002, 0x42, 0x18}, 0x18) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fallocate(r0, 0x16, 0x7, 0x6985) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000001000010000000c00000000000000000000000000ff7f000000000000040014"], 0x24}}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r5, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x7e84, &(0x7f0000002200)={0x0, 0x0, 0x0, 0x1, 0x3c, 0x0, r1}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000002280), &(0x7f00000022c0)=0x0) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000002300), 0x80180, 0x0) syz_io_uring_submit(r3, r6, &(0x7f0000002340)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x3, 0x0, @fd=r7, 0x6, 0x0, 0xff, 0x2, 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002380)=ANY=[@ANYBLOB="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"/5812], 0x16b0) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f00000021c0)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002180)={&(0x7f0000002140)={0x2c, 0xd, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x85}, 0x40000) 04:58:26 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:26 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000280)=ANY=[]) chroot(&(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) write$tcp_mem(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x2, 0x2, 0x80, 0x41, 0x0, 0x7, 0x8080, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffff8, 0x1, @perf_bp={&(0x7f00000000c0), 0x3}, 0x8020, 0x38, 0x80000000, 0x4, 0x1000, 0x9, 0xa2, 0x0, 0x8001, 0x0, 0x5d4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0xffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x10000) sendfile(r0, r1, 0x0, 0x200) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000280)=@md5={0x1, "15f7908058c4afd3a7fb4f3bdd2b1baa"}, 0x11, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051380)={0x2c58, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "dd4526c9229fec"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000048480)={0x0, 0x0, "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", "1b874ddab1181bd268fb8213d82692c0c60a72d0a13a39b4d385c5a03be7121256e820be77dfc73dcb53a473ef005ce7611f4bf61f46315459481f681b40b4e13a98d53c6537a91298ded21919034b2c3dc2b4cf23a756aae4b4d904f6eb448214083a223f808621c778ba09c351cd577097093a481854ca68408b599f0048f9c8b5db31ccbcb145ba6304da691d7d3705ce128cb709f5c21fdbbfd28ffcdd46fba97e1b5582359d4a1671f4cb84366438066ffe7f4548e84c825fc51285c5d310629784a110fef0960476c2fc7cc437ded7bb6e3ce70de831793ab87924cf57b6fe7558c5a5f6b89e048d53131ffd68374f7196f9a06ccc1f0cced12a6b342dd1d3b339627089ffd058c532b1ae17be63a3e449b93fd483ec32a2ee767486a7defd3b6da8e85c8888b073a152f8454389cdc466b71224bff951b50a7649c07bd6939a52df5d34904412d2c8d66f241a9b2a635f4ab71c8915e827bcf773204989f38d2e296570278724856d20f13571140e9f0b4d2719c05b58243a6a2e5d0c633b8a185c715eddf12852e6f83d422848942602c0ca71be5a369927997a5b5a99bd7745868a6de246b5757716ad332e69b676a8db197751c78c460ae4ec20092f8d53fbc189d2dc7dd04cfd6f9acd5a07de147aa06c2108dc68c952272447692233beb5870c8fb57b434c1f4dfd7a3fa9277009086ee51cfaab7d082c29aa7ee498b8c5163dafff3a1e8ea7874f35a9414a36c79640f4b2a361fb26d0c6619d16189e70db452b4fb4ed5cb1ea8ff3442e6acf3bf3ab3c6d36e51ac475079b0ad43e45951bac96ba3f304992863bc44a417f48c488379c3a570ce628d78b403fa1e9041578668a848598fb00e28a33e654fcc32e68631943ad4cc4c05532048c5a35cd16ea1565e413ffcb143ac616be2caf31a95f8dc5b72511916e27ad1e7cc01ed18b396add0a9d2c50b22ae4a6981c4e8c9beddd3451961fba6c635b2f4836a3d9b629613b3eca8195095bb14390a139c89c1415533b1c0829ebfeb893960fe310e13651b1dc6be1423370a45c4d3735c076bf7dceae913b16db1c2a4475e92843c68b3e0c30326c9f498d628ee3855497370b5e25fc829ae4a12c4c23460cd8cfd8d895318ab61a24f8a294fd3f74d287db57e92e5cc8eea5d6d6b9e6aa42a4c394e1e963da71c4392ee47270d35a46d43f368779b5c70d0173fdbb69951df4b9aa3412366c921d3e97d7ef49a4e38633be544dea76b727877274683112e490696c17c5eba2f420ee17b99a758d591e9b84290fd45e36c909415dfb42ed51c6011106931d0acaf8da67de4bc7baa6247e1b4255f3f3f2c4e947264b2e308caa7db6005d05bb761c8dda5d98cc4356d6af26de42229696efbc0038b8bda7cb2b52240e72f344646fef222940e0dc2a36e5d0aba8100c120508dbaecbfff60aaf7a47012d5f146406b22d884f59ad2c60d01edf028fd3bc78768336ad6cbd70d94f58c0de3aa2ccce98543cfaa72a2421537044fa9d0ef2806c4c1ceafd207333880ee7e79ea9a0140df3d350f98fd1b3adcb03c7055e85efcc66578ff0546b120ceb7de587b3d456b588c33264aadf54bc4feb28c4dace8e430f5d388d60bc82f60e037f9c9e6313d8720168ad607cb3cc5c17533321870ee5631f54a54acc9fb3b731bfc9138e7f5b907d2145836c9a8a8a48a3cd7517b020b1f31f8b69a3ab39f682ccda788ceec4ccd15a32832c50d9e51919a1b2083adde20d6225277824ec9a3b432736956103f6c64f77e956fdd5b1b2d32a1956f5dd16cf48bda0fafbc11e3b89b2ae3962b833c054641c45974a6825357ff6341e731688b89790510517fa801b415a555282d235793e0ef73875636e141a57abf6ba960cd090b60d35028ac2f6d609ef35b4dcf17938355534aa478bb69530e4b6f02a1d17c6e3b8147a390a0ff738ca253959c9e57275a8034a1749a2e2094db9f7e2d5e7787183af2c94e41cb37bf5f286e6a35b780132435e4ef831dc658d09eaaf2be812f0044047ad467b2da5e5c13cc9d69027ff90a0dfe93faa75912190f3584be6b663782644bf9c7f0f60925647f8a13cc46fefd7698e446c4392a013603935036c161395bcf0aa05bc96d3f752967d83f07e4514a815a910a15eff9fa361f1093cc9b0580edc45d0ddf411305dbb62960364c4781704742e7da47222aade7eef84f0c6c24d4ac52af1f512c1f8d1ae55fbee66002cf63ca2b1d7491152bb8bf2210a3a495d83d661597ec69a18e4d7ecacbbecf306ae32d303e90ef71062a8f06f43e4d07bab74ebcbfa3797e3787977c5f24389325a3c9ae3b3b041a96f0735a3e24ef85b0bf68445afd8e50d33dc7c119d92d61f718f822aa6fc613fa3d0a17beb35ba52453596db7d7a9bfcbdff2578e4a4b20c4a754cd9b395b1279458c6e593129d8c5ccfc75e49e7d619b68bb09196b7347530e8605adeefd665a5312e9d80f1e6e66d0de10ba7a5798562a1e264e9c9e0f2d344de2643a4b85a72eb22cdbc1ef9ccdad4732330dd5a302182378da9633be2577f1245f5a532e250daedffa710fe6f99d14fa7099337ee7c38b072b1409fa7676467ddfa30efa30633d37c7412529a673a64d847394d08190a02dc77080ffb0f57007aaf74a4b0e82d948da6b7ae124137e4813c4cc62ad1b70c0cb4da2f38a1e1f3e1ff18aaad6c30110716f85b83b3757df438063313dee946449b1bc45cca1f10dcf1a5937c1a036d331fd39460e168658b1adbb03e301d09d7d11fe002defccbc7bf336ac51ad5c50930f81eec165a6c84a4d8ce0bf07aca3c8e975cb5d5ffb2d1ab03dfb8ee9d04211445e4c95a4c9bdb4fd176bc0901a930cfc45035de9eea4698b08f28b14ab4d36829118e394e72830c05e181310213225e5cfee30b854a0445c0d1b37b07399a05cfa8fa7ed78f73d84bec2a838d9e5cef7e7a8cb30615e1481df371237fa5c78646fc90526c20fdb0f1828620892352c289bb674477dcc2d8e6ddaefa2246cb8ccf16eb40df35f48cdfd25f127e30f9521eceb38670b488f45ef6a4a9c03cfdd376287afecbd3e9f3c0117b5cc22cff6d172451c05626553e4a58ee9fd10a517ee47848322b788fa28bbd775307b0282013da4392b46b4e9a11ec13e7208c4cbca19b8b77c9c7c5fe5717e23f919bb84db92b7828b03d2035e5823e12261eac8b86f368ab5a4561a9911112956aafa2b4ea655658dc7742d7b110198daa7d95668a17956b747a67c034ac4d28d7c298781b355c0385282518be2d76d9f8e7a634fbe85bb3d3e394eb1bd9883e2c99d0523a45d8e2df316d62aeb0925bb22a1f4ed664e79a9411bc87c2a2561206e38f906739d0d4309364a2684cf5714357df71bb55953cb79b0ca03216fe3131aff02fc8b16d6b52252a99bfc2223a007ed709508e6885d618be1b2c4d72dd5a33ed3d721e90de65a9cd19e36317ae303fa112bfb18c8b242f6d8f8b5372f8a1ae82598ddf87a033a62803473ca6a4e89556dfcf251b7b7736a79a603cbecaf32d4126ebd93c6d6baac6dea80484135098b1b0a83cdfeda6a5762668f96127586ab9c750e3bd88bc3736063c0e2b16029ecf75494b46bfbe68911d88f0403696824eb5468cf592373c399b2afac623eee0f39196074cb66f09ccfee6c91ef1a334763d91b1be5a65a48f97cad4c726434ead1636049f257eba813ed86bb99305e2fae49e0c428685dbaa6c16eb54a1c7da4cb9a2f5721e46b3a06a84ea7df88565b63c709e611b87bce0cc71e692066bcbb5bfd7c23045fac6fd7586e945b0d95d6e5684dd416e9ab760db0f9d70f28321ba343a0371fcff6359be9b6a84a0d282022bcd27f50367e607546c3a4d943f6d3b516f791f66d6273207d6a64f25d5e2e775ae82ab8c30ff2a069105e67f07f100b74f65d70840549e86ef246047405005c9d4fafd3514fce4c17f56983232a9e99e3f9916e8004bd9c1c4b46133c62bbee34f8cdefb2b0d02a30a9bd761c3e23eef50d204be59fd3a90b30d3958bea72dacbd0f30fcf3903eb28025dc451050c0fc30f95c199fc64e20a8dd6932d6e502987b8d5c7c9dc092334ef2f864119a4884fc3477b700ec9cdf1964132c645f5268effef8f8466ccc5e97fbc475e02b99b125cb5234fe1ba7fca5fa25be9f3b1eef04afa40f776828ac261845f7dbf9ac45ba6b77d680563e227e66b077d613b2216e0ad7a1906406c20b91dcc7f8b1f4bd806364ad9f73873a6b6b6b7f442f9d0303dde4728b00c1f1c9f9e14fa3adeb3803170782a4ee1b565304e340b3f52e73d6df443db10d6d82ea06d29086e262c57a61852164818b7014f14f3ae0b403777ec739498e294f20fe6a594ac81d0b8d086b085531d2a863e0c866cb8e040929c98d3f6f6920dbe395372189f07057d6e99cfdd6a26ab6a6abe14c35b0c91810e0ee811850d5cc8a2ed4f46bd1a65b4ce3c14c1be52edd1b238f298ee6604f8f11f1c6aff33a88c6d9e087010c57f1e86f3bb46801136ab228b5ec68aa56692a63e325b7d88db372d06d20680c4c5255f4a4d522caf8a60117e0ac4bdad5dd4a51fdf2fcb12ac3550ed208775122cc5416e1291e5530ce8aac8889612daeee645ce27eec698040f920fd71d74bfaef74c53423df38897648db0fa9baad12036f164586a23905ca2bf4c4f667616d29687647dc44a00bcc09ec6fa7a513880d30ed7064ed086bd5f8aa62868ea81c0672f09e2d0f71c13025c74d8f2e2cb093b910b4f838555cd93968c6476ebc8ebc598fa09680c307a6ca07f57f62d9f6392cd0e6d111d2862b35fd44147fdf996858a9f6d682642a97913f9007bb968f89abd8c2bd7728e7d2e8b7fbf0ec71254fa06115b020ac2ecb3bd4123846a83a04aef89f38a8f840c5ead804fafdb86a529a24bffdc57d26ae5b5039a0f74d0fe5cde2502072e25d2bf5f30f44bee5235ad97fc8b4f2e94d0addb921fe6cd6a38abc520fd96f8a218f668671fe698dc760132fae167d07117ce6f345bc111369eaf3246a439a4761359d61210784b35957bedb8d1b06f878284891a43bcc7a138f98734ee86da8a7cdd89ac9379f5607468e93521e04618fa5416416e1cbbe451f0950d511b91032b2fa1ea99d33db17e897d018369c2770b32d3d4c06fb63eb029238d4de478e318991d1da8505453cbcb48d550835925ef63f274c7ff533e210e61fe34065abb34b96fb98dad0d8a11d9217e017ee4ad04bb2b01ec77ef17b4f192da185194088116073f69c29b60010ee4af576da12afe671cc253aaac6d17b3388a5d84e9b4ab1dd3045a5719da85bc88f2f6c06a1c0784f841d9e2b1e35b26ccb4677a72d7214e3bd40230bc4c88cfaf70777da82f4d4b71b73d9a8bff7f2c3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049480)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}], 0x33, "1b991b8cef4768"}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="00012dbd7000ffdbdf256300000008000300", @ANYRES32=0x0, @ANYBLOB="00b1c02006d13980fe3dac14ca6c41b13a8dbed0422d0b6c25162455a7e261d700000000000000cf242d0748d202689f0f78c2b975bee969"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80c0) syz_io_uring_setup(0x44ae, &(0x7f0000000100), &(0x7f0000000000/0x12000)=nil, &(0x7f000000f000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000000)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, 0x0) [ 451.249247] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 451.262011] EXT4-fs (loop7): re-mounted. Opts: (null) 04:58:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:26 executing program 1: syz_emit_ethernet(0x52, &(0x7f0000000080)=ANY=[@ANYBLOB="aa91aaaaaaaaaaaaaaaaaa000800450000440000000000069078ac1e0001ac1414bb00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="c000000090780000021e0c100000000000000000001e0c8000"/36], 0x0) syz_emit_ethernet(0x86, &(0x7f0000000100)={@local, @broadcast, @void, {@generic={0x19, "280b7852cddd96096b43f06889bc46a92510804ccac023690067b24de0610d744a03616e2919bf85ccc22374d4bb13419ba3fd9dca92263a2806887211cd39f3b406a59a9d289cf7a417aac6bab36523f11131f6ddc9da06687749f3bde32e9e8da8e8f96dc4e303a8bd193f7da54259053f524191b69597"}}}, &(0x7f0000000000)={0x1, 0x2, [0x7a6, 0x97b, 0xb85, 0x5ec]}) 04:58:26 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)) r1 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000000), &(0x7f0000000180)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) socket(0x6, 0x0, 0x4) openat(0xffffffffffffffff, 0x0, 0x381, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'ip6gre0\x00'}) creat(0x0, 0x0) 04:58:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) close(r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r2, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xffff, 0x1f}}}}, [@NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x9}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x4}, @NL80211_ATTR_SSID={0x20, 0x34, @random="8c57e9c34edb025c225df7142127519d18402dc0fa5ef5699ded12a1"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x5}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4040004}, 0x20004000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006000000000000000000380000000000000000000000000020000100"], 0x58) close(r3) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r4) r5 = signalfd4(r4, &(0x7f00000001c0), 0x8, 0x0) pwrite64(r5, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000006c0)) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:58:26 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 451.614398] SELinux: Context system_u:object_r:iptables_unit_file_t:s0 is not valid (left unmapped). 04:58:26 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 451.629130] audit: type=1400 audit(1684385906.477:31): avc: denied { associate } for pid=5432 comm="syz-executor.7" name="cgroup.procs" dev="cgroup2" ino=1341 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:iptables_unit_file_t:s0" 04:58:39 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:39 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:39 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240), 0x0) close(r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r2, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0xffff, 0x1f}}}}, [@NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x9}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x4}, @NL80211_ATTR_SSID={0x20, 0x34, @random="8c57e9c34edb025c225df7142127519d18402dc0fa5ef5699ded12a1"}, @NL80211_ATTR_FILS_CACHE_ID={0x6, 0xfd, 0x5}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4040004}, 0x20004000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) write$binfmt_elf32(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020006000000000000000000380000000000000000000000000020000100"], 0x58) close(r3) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r4) r5 = signalfd4(r4, &(0x7f00000001c0), 0x8, 0x0) pwrite64(r5, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448e4, &(0x7f00000006c0)) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 04:58:39 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:39 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) dup2(0xffffffffffffffff, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:39 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:39 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:40 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:40 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:40 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:40 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x8a, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x105000, 0x80) sendmsg$NL80211_CMD_DEL_PMK(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r1, 0x4, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}]}, 0x50}, 0x1, 0x0, 0x0, 0x40001}, 0x40) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {{0x8}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) 04:58:54 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:54 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:54 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:54 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:54 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:58:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x110, r1, 0x0) syz_io_uring_complete(r2) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0xfdef) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x660c) 04:58:54 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:58:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) fchdir(r1) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) creat(&(0x7f0000000080)='./file0\x00', 0x0) 04:58:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x8a, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000580)={'wlan1\x00', 0x0}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x105000, 0x80) sendmsg$NL80211_CMD_DEL_PMK(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r1, 0x4, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}]}, 0x50}, 0x1, 0x0, 0x0, 0x40001}, 0x40) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {{0x8}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) 04:59:07 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) fchdir(r1) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) creat(&(0x7f0000000080)='./file0\x00', 0x0) 04:59:07 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:07 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(0xffffffffffffffff, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r1, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) link(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) pwrite64(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) pwritev(r3, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000080)="cbb71e71cbd8e5f6bb75d2afc7", 0x1}, {&(0x7f0000000240)="674b56f53f4a79b3fbad1c26031dfbac5a8d0682f361fcea4821df35342dde4ae98164e89a2356514a3d176eb827ba466dfd48e7761284620c9b77e7ca60c88f57ca4f5076bcfae84d073145767015dd3871533eee0086218b9866f59465998768dc73a9d16c2d7bebac9ee944420e5f5485ada4a7df4da4020c61", 0x7b}, {&(0x7f0000000340)="3a106f9c842da604ba7dcc272b1cd78b2629933c08064a4453c0cb39e4e0217a752b6c001635744a9bf8adae0db5567f8f0a6a455cbc6bb4819d71d342209832b2031cd6945300dc45b9a65d4b671df893d786afa03603f6d39fc88c1f6a6e350d7d288b52391fb0b60a5d8d17c2bed00697fe6a1f2b6a6c8408938b4e1c4aa200a1a658789d47d00a1a9ae820aaad53d63947f8f4693ff675abae336b07d2208e625a1b7148224915f3ce5ba890539970b006a8589ff7add888987c6361756206fc4e3b46d780af09e06f0d54769b11c2d263fea5008793b0bc44af6da2bc36dbef3a2964c6c2161b450f611654a2e95e30f69b79cb6642dd5d4f579630ae86a3e9fe2497e2a6876bce2b3d35477036b34ac08e6f6f22e00e1271ace018b3a98368cc1806545c941b4eaee37eb6e70e0eabbbb5c5e827942268bf54dec61bd239a657b9904468b065427c13047eb064346e4788e4600b1f4d11918c5306ddefa85b5e58a6078159eb12ea413f1a178a5b119b2337adc72632aa6c5a7760e39d063ac5ddb508adce551e2be9dd985a6211b9c8619fe59a90b8812d1e4b2d45253ba19a0f884c348e47eb67a81bb90e036604d370f8aab9758703f3547d3428ba8f0516a02fc17c6b57a9f4c5f84f0d144c4b3f5c9b9b5c2e53b1c0bcb15782fdc3d12447dfcaab1964beadfb761c69a12373622e79f57ea5ce8360044c007fd94534bd7f8a0bbb83400b4a8cf0d7879acf97b0bf4aaa54576614dac7aa7ed4d342364ecbd9d0129a249d42c1a70c9ccc86ef4a6774b229377aad80f076b4deeed736921617435834b11f3c7a840bee6f3a59e86c8f26ca27b07288fd0cbf00eb75a40acbb58a65c69c1a39bca92b9204193b97665ff14bd41ab64ccf2161958db6c711b159abf8631ee0597910cedf73a87080229921bc2e6cc6f26d0a75ca0d652d905cb59fc2e04a5ede78866925d9fcc2503a458b42072e0f7786138aee1c818e9025aa185a7080e4900b163b042e528e7035cb9a2e0173ea3543e242f20eb5f3a4b7fae36b6649ed99e1665eaa59360aca19b11ec121c413f11902483df8047d8fd4769b3e93989dde0894a09af08a4cdc161f82b8930bd888aeed653a8e961dd2f796cb595e38d6212e3d459096a6a634f4cc6063c257684caf64644378bbc018af2d36c8447c890e9745189e3d1fced20ce17e8536920076d2ab32929159397d7f4f35ad35f6dcafbe457df6b43535327a3bd86b73d80ec71ad55dd5156ce6539ebabb866623c99acb850970a439717cd699813f1bcbdd3537402ca01919ff2a106701d22270e8daf6ecbadaff7badb674bdc0bf10f2dceb327f6359cd345b1af741c6e52e1a1950b7a12a154a2d1cb1c7d3713f8d1bec3e086bfad90a69186b253e786883209fd312db3ca503c87d54439d957323e7760ce50eac83e6fad1195266e5ad080d2cbc0cd2114ba3fdd7ed887e3011c5978cf25b3dbd5b2af6a1ec0cd79cee0f3d009e80fdfa7a87d9d57a6d92f3faad0ff892d285bf425368caed13bf7879c8800463c3cccd0666ec1eef91a4acdc97c7dd8e5b97c4f2e371dd4e5d179d01c641dd8c66aa33cc62280af9c829a48d1449d0a3593d195038ea83010b4a4d728f101bcf6f2672295b04b64ec850e4f30014a3b9107f63f847dbcc889419f2b6f03a0858b9432e9bdb73016bba3631298395f9e6e7b5eda54fa385796bff22865b2b2b99945d11677308ccc179e98d9bffe567e8721937b8cb113ecd0b72cbd45d6d74664ed64b6d817be93b0447fba7d54a120ddd88a6490b3159da0ae36075be82c5ef924f348680a84b0b5fdda8eddb1785b2cf96c12dcc318dfd97a1d9a191aa2898089741ecadb866d7b8a6059d61f9724380c3ef092f7b7d8c7450fe5a439ba9daf9313019795e32e49f32809a3edc711d660b0ac50ae37cf3652de3407534a6e623fb32b57c304df46ddfcf300d9fc98b7acce5c1637ffb018f948302c5ea6affe09fcdb0f6df1f78ce6cae0fc9f75dcb34d369ebe51b1c667bfe1928708a233afe291da01816add86a139f2848f1b1db04ecd6c0f514f080bbf0e467205f44b72b64aba1da85d500b4446a965f69f2466ef13226d3595c6a7c356ff4bfc87f326d7c89dbf13d8e15678cb2e6a03ba3aca67a77658780a6faa206191d17be2408f99863a5c5b8e7ce98caa270689a6ef76ef5a801badcc2434d26c3d708f5683d54faab0b5ae9e354d009e066bc7ee9300303704c56c6238c15310f89bd01cd841fbd68f3d1add0c12a09c42242b9a78fe8a6b516134a78844a84df89a86a987ef07757adc2e1d10472963fa9d702260223e0565cab1d1d5acb09cddf6d0e3d4a8875466d9b38f96993838e3012bd7d3d85a0e22118c1cd333747e67790ce5b219801d9d0d7040aae0b28dbb0f04d187ed2c31b0112f5640aef0715656a257e188537b938e9ff0db9a95f7df8b0f0029ef445b5e48b5e87e14b01b6faa77a39616ce11b8d2a8aa725bb60286f08638190b1d174d1b6bdc5232e5942a320a8945cefd51652d888ec6031d4309cb311a40bbee63db3494a3153cdbb51fd9c943402557f5d1b0a879d3c2cdbc1c2bd6fdddb578bb2771c99b7efc79bdd3dd431e438074f71f2c8400128d310d8e5d3d00eab0dc50774242a88daa48a7f83a408a83ade1c2c36bf5e55d762f372bba12e1d6815b1a524df4fdf68a54b37d053ff9a2f9965cd041512f4d500d1a72fd9e051be0d787e76e819c56eba92ddd1cbbc98776fb5ba5b7f4ba56c65b8e1255401ebc12da2c7e4b453f770dbee6851e496333b7a0578983260e9d1eabf38220534b0f8e46bf81cb7e4019d4d2c6242e31bf0e33dc1f6acc3abd6554ef91180f105456e35d6cc00a946f02323d48999f92b9d80b9cf728ce764952f36ce828b94d1839849c5950b67c908a850163b50fbf7c8d06f6a8718391f4be5973851b0678edaa3f487a5307567f21a729cd0818b3da14b57e067a3b4abae1e7b7a817e7878dd8ab37eb4f8736e3aa32fec2ef0a3f7d80843706bcc2c0bf820a446fbe81e1300172f861ee71281a2a3fd25ca7ab0096b7162c1bcff0dc3a4af7185b2f44e3d309e320ab123ca389e0907105a6430a664717b756b5024b8daef787fb41f8b734b801d24cccda5f8cfeff144428a8fec80dc38845089c685586a061b983f530a99561cd06224b54fbab5dbb79ea630427e396e2bd89455b14e9420db5d75006059758420e30f6d90de0e9d3571a14e4d26dd6f0fa6a404b4f5fb4bff8479e612aa7043d5d184824c6e84374c34ecb012e909cf02fe7e0b7582b207ce0eeb41fe96bd15254e1376c00196e74e32f92ba1f046841014cfbb1c8cad7b9b0bd9e40dcd531dccb21d6079cfdd78be1da2260cd5cd5fcad18c805fcf6c775f88e101480297ee8024b5175e5fc6dbf644977c521655968ca2286eb0bece7ebfe888ea8ee4c2fc1438d999c4b26c4a4fc38726337537eda4fc7963cb60711ae0f52e353e52713682ea8f7aad927e7af802592734ad299c4a5b8b2cfbcf32e363ffe3b8ac54958ddda930d9a5eefdb63eebec3fed3a33bbe9d57736aa25ba8783e6778682008bb1eca2c0ad1a200827fdad283198d7c82b3e7b625a13fd43c77e5ac5a23a0e538037f35bf8fc24d1eab35069101a4d2475bc6d03e46c1d58436f6e3921610bce74c81fb5630c12d0df6910f10731e2d47f0cd112be4d165090f8ce24ff710f261d5110be16ac40b08204340505828d872390589a82f6a906abfb49b273aaa51e93f5d6395589072082b2af84d9ca18720176995dd46244f6fe2da6ac2656f50adc3bbd179061ca306a4f4074c58bda3ca363b8ec8447e32ee6cccd3cff03bd29b5a29c6fe89e6f8f5e48d198250d4795e2a24e169b73cd37c575e0206c284bddb0bb316d0dce9ecc58aedeb0ec241eb75649ddb6f47e54608368333a296f8c6c3d6d0c9fafd5b42ccae2e8171eebf37b011c3dc778870a9888db1d399c7c18f5edf70c205a2a03ee880908eab2221747d8d0c1b9e050662bec82f3a374a97069f5d7e023539f21f910e2159f7b9f9b79fa4c5c7467b1a133ac3cde105260a667f4621b3ea39d5bb38501991d71254f7f36c4f515720ba88baf077e1a17aff2d05cf514dbe6f07be052e0e7fac45db374219173e1aed83c0fee919ef1836f872e97508a0f1dd5f82b443027d24e179d7a1af10b78341d0f45cc7628258193dff7085681196654255ced046ef449d4d11df3862f1dcfb70ae6efe62ad2e128a5351606576674fa39a92d090d5c73827de16952e4a01dcc9d1d8c4136c83ed1e61acc8e22777ba7eb9faf47f0596d9fa67a113ae76f6b1046ce0cc0101d56705d2afeebacb8740b0684918a34456d49a6b53f4983391c2a5ce65287ecc19707b8a42581019b5fce4e1c6ad76e3291aedc2c53ca4f17cd7859a97cf75a9c227c2b4c669c0d098e87bac831596510a92929d1a66fc57552a0e02232e0c73c588079cfb6291fed1297dc923f00708e3465d4688cc9f9f9470449bf4fc119095cd02c283c4047d6eec1a81b79fe82a5226644073a6862495c34258824135526435e3ebacb2baf212574cd914a007c2da70e1a038761f0030f0f5ad15736b6e29eeef36412c9bf85a7d7d78c999f6b039dfa9ba7acaf632cc8b9f138d7d4b633b3688d5a1d27697401e8fd086cccb5fc54180d8a7e847ba7be5ed5d26b7d83f05d2bc85b1cadaacf0edaa0a517dd59352b9d063fcd4d02482b4243cbfa71aba06db926567171b69007bbf7b5943038d9e5b5be0eed0338f519b32ed2859d1298a11d1b1a9a5f6afeec82a4248b650e788716f72c69a3638691992042a34e93018cc11e17c9b2901fa0558f682c3bca7a5f6fc852a077e3003e78c3c81532a4e438a5cfc9406dec4c9869fd5aa1656095a8f749267498b4ae888ff45458580fd506c8cd386956a706e6b8e7ab8abd31c64c92dd747fc141212dcd007d98c81b93dc99df76f99c3cd6f48befacb13f317b40526314f686aa6e5de3e7c51e3790ef73252932f737bf8102c1e43668fea6044b50e3a84b28a09d91102ec97e95f1368f331015e0ff9ee1fce4bac2d7da72cdc52e49bbe24bcb7a8618c08f8b41b03a5ed0d31d4625b3774365eb70d508ce1e23ea9b90a85511d45da5d983f6caf876aaccd08b9d107ab39c0553de1976f7803747972c5481cfd50f3351b1e59b8265e9e440f618165bd891971eb2cdd894014b33775e604cebad4afd3be1f018fc62811714eed3a11242ce8c952da08365359215d222938f84bac4f2137a51fb018311d444b0c381a24336425825aebd68b8ff309a74a82eccf9a7c7da1a8b52fa8a47c562949d9faf53b9095f3f7d095650f9b0026b40f29684da3d4a3f6dca488e4c6c7a9f543d5d992f06ff60c4a1ddb255b72c649b5a801bb62749084abe24ea62890bafd4fb4ac5125fa278c9fac29945aa379876d102aef156b512f98dbc10bcb8935b85a2d072525da55a2ff7444e35f97780ccaa517b30349dc2458b3c8187b044b9b811c912bc5aad4650abc74c8fb8564e0f18b8391172d7be5c9d6754abffa3b4d9fe50ddafafd8688f3ed1ad02f0230e431a5e871ad4631924797801ba7289e8cf17ddf36841b2cf1128f1e118402602f10b972cf6fd5e1bcbb31b0653ad2f6d82fe8d713c69179edf607488990901ae53270833dc5785fb7441bef57a1d476326384e6c4e3630065556cc59f90f17020c819fedcc7cd2747222ee8ff6c97a42d82d3e2fee", 0x1000}, {&(0x7f0000001340)="a5ce5ff1859693ef3809ece528235a57b9d376e47b23ef95ba436167d39ed3d4c67c85707c40fd8a71151c789212dc3b40e58e9f3324213034b3a7f739e10366512b09fd621fcd8ae230112e563923c392bfe6b7735e2c6fb7", 0x59}, {&(0x7f00000001c0)="211f52b94d710dfdeba41fc46d7962a973f8d75780a4c8eb", 0x18}], 0x6, 0x2, 0x7) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) sendfile(r5, 0xffffffffffffffff, 0x0, 0xffe3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r6, &(0x7f0000000180)={0x24, @long}, 0x14) 04:59:07 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:07 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:07 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 492.628556] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 04:59:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(0xffffffffffffffff, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r1, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x400) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x8000, 0x100) r1 = socket$netlink(0x10, 0x3, 0xa) signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x2d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) sendfile(r1, r0, 0x0, 0x4000007ffffffc) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000003c0), 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) getgid() 04:59:07 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(0xffffffffffffffff, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r1, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:08 executing program 2: ioctl$CDROMVOLREAD(0xffffffffffffffff, 0x5313, &(0x7f0000000000)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xfffffdec, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x18, 0x109, 0x0, 0x0, {0xa}, [@typed={0x8, 0x600, 0x0, 0x0, @u32}, @typed={0x8, 0x4, 0x0, 0x0, @u32=0x4}]}, 0x24}}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140), r0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x7fffffff, 0x4) [ 493.269288] IPv6: NLM_F_REPLACE set, but no existing node found! [ 493.289218] IPv6: NLM_F_REPLACE set, but no existing node found! 04:59:08 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:08 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:08 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 04:59:08 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x349041, 0x15}, 0x18) getsockname(0xffffffffffffffff, 0x0, 0x0) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000002100)='./file2\x00', 0x0, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x84502, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = dup2(0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r4, 0x0, 0x7ffffff9) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r5, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, r6) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000440)={{r5}, 0x0, 0x0, @inherit={0x80, &(0x7f00000003c0)={0x1, 0x7, 0x0, 0x6, {0x4, 0x4, 0x3af8, 0x1f, 0x20}, [0xffffffffffffffe0, 0x5, 0x7, 0x53, 0x5, 0x9, 0xb]}}, @subvolid=0x3}) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xd2, 0x2, 0x7f, 0x20, 0x0, 0xf04, 0x100, 0xb, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0x1}, 0x40000, 0x600, 0x1000, 0x7, 0x10000, 0x80, 0x2400, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xd, 0xffffffffffffffff, 0x1) sendfile(r1, r2, 0x0, 0x100000001) 04:59:08 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:08 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:08 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:23 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x4) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x88000, 0x101) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x4060000) unshare(0x20020800) unshare(0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x8, 0x2e, 0x1f, 0x1, 0x0, 0x3, 0x10200, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext={0x5ed, 0x1ff}, 0x1c404, 0x9168, 0x3592, 0x6, 0x0, 0x5, 0x0, 0x0, 0xd67}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000000200000018000000", @ANYRES32=r0, @ANYBLOB="0000000000000000362f66696c653000833d1494327b67478db0fbc9137a6f7ce623d2bd0289363fb608f89ffaf597671ef1dbd389b8bd00f089e3502da57706147896ded4d99f73744d83fd4bfbddcde5f409c64eb0dc0d"]) fremovexattr(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="746870657400c9f25e9344569f7fa57a39cc1324a35b909d393aa4dfb9cf2c0b310100b532bf96fcb0a122c642c8914981dde8ded26e0e06cf0688301ce3bed9c6b85c638585a4d1a16a73857c6b27c0fc49e9ad"]) openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x181802, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) 04:59:23 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:23 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x96}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r6, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r6, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r9, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r9, 0x0, 0x0}, 0x0) syz_io_uring_submit(r4, r8, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x7, 0x0, 0x800, 0x0, 0x1}, 0x50) 04:59:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9e66e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc11d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3f, 0x7f, 0x0, 0x6, 0x0, 0x7, 0x40000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x54f, 0xfffffffffffffffa}, 0x0, 0x6, 0x0, 0x2, 0x80, 0xd4de, 0x9, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) syz_open_pts(0xffffffffffffffff, 0x430080) recvmmsg(r0, &(0x7f0000000000), 0x5ac, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = getpid() r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x4, 0x7, 0x3f, 0x40, 0x0, 0x3, 0xc004a, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x302c, 0x2, @perf_bp={&(0x7f0000000100)}, 0x803, 0xd68, 0x0, 0x9, 0x80000001, 0xa41bf37, 0x3f, 0x0, 0x10000, 0x0, 0x9}, r1, 0xe, r2, 0x8) 04:59:23 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:23 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:23 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) [ 508.442920] autofs4:pid:5656:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2), cmd(0xc018937e) [ 508.445526] autofs4:pid:5656:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) 04:59:23 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 508.547202] autofs4:pid:5656:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2), cmd(0xc018937e) [ 508.549910] autofs4:pid:5656:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) 04:59:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./file0\x00', r0, 0xee01) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000001200)=[{&(0x7f0000000200)="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", 0x1000, 0xb9f}], 0x1200001, &(0x7f0000001240)={[{@shortname_lower}, {@utf8}, {@fat=@uid={'uid', 0x3d, r2}}, {@shortname_lower}, {@rodir}, {@shortname_winnt}, {@shortname_win95}, {@numtail}, {@rodir}], [{@seclabel}, {@dont_appraise}, {@subj_type={'subj_type', 0x3d, '\\$.,\\-\xd3'}}]}) setresuid(0xffffffffffffffff, r1, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 04:59:23 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)={0x28, r0, 0x621, 0x0, 0x0, {}, [@NL80211_ATTR_REG_RULES={0x4}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_DFS_REGION={0x5}]}, 0x28}}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') sendmsg$DEVLINK_CMD_PORT_SPLIT(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xfc, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0x9, 0x1}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x1}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000}, 0x1) 04:59:23 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 508.806346] FAT-fs (loop7): Unrecognized mount option "dont_appraise" or missing value 04:59:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:23 executing program 7: ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000002ec0), 0x4) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000100)={0xa, 0x4e20, 0x3, @rand_addr=' \x01\x00', 0xb86}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000200)="48e6ccaa67ba16fed1a396ac08639a83de9476d1692f0af7f658560de2e1379b8fc73cfec8c901ab2ceeff6dd2d35cd1d11115602832fd14eb420160c31faab9aacbd1d4cff77276f052e811ede843dc0d1de06fb5133c1fa715581a2b8a309332e5bfc8de2ac90e19efc46a7236807681eac892a7d3fa43479a93cf61420a94435f69b0c62cb46939712e52c66a4ec02c0b2f3a44527c924381bec5d3ca6b2835140b21520d7b2ed6e351966b74736d03cf4723ad386b78485c71a7003f2a85d161f4a43da16fa896df23", 0xcb}], 0x1, &(0x7f0000000440)=[@rthdr={{0x38, 0x29, 0x39, {0x2e, 0x4, 0x0, 0x65, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast2}, @mcast1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x80000000}}], 0x50}, 0x8800) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000580)={@in={{0x2, 0x4e22, @private=0xa010100}}, 0x0, 0x0, 0x4e, 0x0, "15bb6949bc674e310b74d22123bebbcd37c5097fd53da62c0100000100107020ea6770533530931d140a11973acb9dcc0d8d21ecffffffffffff0001008d8d2d8bba069588783e32b71300"}, 0xd8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2692, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet6(r0, &(0x7f0000001e00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f511, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) unlinkat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x200) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)={0x0, 0x1, 0x2, 0x9}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, 0x0) 04:59:39 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x80) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)="e154cc6e412c2e11df3ef8e149d040c85a65e95b2984851ba6b3960202a10057d076e53ff656c2cef49b9c4ca9f158bd9f9d5b44e4b9cf46dfe4f655b91ea19c8661dd73b7e7831043292ce6d494beb154fcbf22fdbca3e7b549118f30411f9490e49a33f9a2221b8bafe72d8447ad4ce1be9b69580746251b88eaec0bedef460168ba7cd9f15eaa6fcaf692", 0x8c, 0xc346ab1a17369e96, &(0x7f0000000100)={0x2, 0x4e23, @private=0xa010100}, 0x10) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0x45fa, 0x4) sendmmsg$inet(r0, &(0x7f0000000000), 0x400000d, 0x0) 04:59:39 executing program 2: pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000300)={'caif0\x00', &(0x7f00000002c0)=@ethtool_rxfh={0x47, 0x10000, 0x0, 0x101, 0x0, "8886eb", 0x4, [0x1, 0x0, 0x9, 0x800, 0x1, 0xff]}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x180400) close(r0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, 0x1, 0x0, 0x0, {0x0, r1}}, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) name_to_handle_at(r2, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0c00000000940600"/20], &(0x7f00000001c0), 0x400) fallocate(r2, 0x0, 0x0, 0x1000002) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000001340)=""/2, 0x2}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x2) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x80c2, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000280), 0x118001, 0x0) dup2(r2, r5) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x1081030000000000) 04:59:39 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) 04:59:39 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:39 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:39 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:39 executing program 7: rename(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @multicast2}, 0x10) fcntl$getflags(r1, 0x40a) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0xfffffffe}, {{@in6=@private1, 0x0, 0x6c}}}, 0xe8) creat(&(0x7f0000000080)='./file0\x00', 0x106) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x0, 0x40081, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') preadv2(r2, &(0x7f0000000580)=[{&(0x7f0000000380)=""/72, 0x48}], 0x1, 0x0, 0x0, 0x17) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r3, 0x7, &(0x7f0000000600)={0x2}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) unshare(0x48020200) 04:59:39 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:53 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:53 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:53 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:53 executing program 2: r0 = creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="ffa22106351700082e2f661c696c653000"]) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000200)="5cc34e3e2c820175b346488e9dc0343210a8a0b7b009dbb60cabbf6c6d00a56ae736c57a6d61af789d15cb3825388ec3a2a3e2424bc270307afa81f94f0c10c94cc1b04714ee2af2e431b5982d2828faedb6cfc2c64278ba824616c7fa67ff524b678f29937f62fdb305f12ad3430fd8795140d5f9a01330e29c9cf4bbd9dfade54a31a7a375e55f8962864257af708e319979b68a8935cfbf3713baf96008a708a2ff7f21dc000000009f91a7f6dfd3238136a6f9c63064d3062a9bab0358ac63e869c6e498fc4cfc540f410edd5e043972379a2334a7525ec02840a955413fba8cd5e9287f0000000000", 0xeb, 0x240, 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(0xffffffffffffffff, 0x40309410, &(0x7f0000000000)={0xa13, 0x4, 0x3, 0x7, 0x3, [0x81, 0x0, 0x0, 0x80]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) pidfd_getfd(0xffffffffffffffff, r1, 0x0) 04:59:53 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5e, 0x40008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xd56}, 0x0, 0x42e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) shutdown(r0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="007da1804886b1655e09966a7e17c44ff9f87834ecdbb6650240e96358eb356dcb1b3d4462fe59be4c704b17c759b22d78"]) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000040)={0x0, 'bond_slave_1\x00', {0x1}, 0x7fff}) 04:59:53 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) 04:59:53 executing program 7: rename(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @multicast2}, 0x10) fcntl$getflags(r1, 0x40a) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0xfffffffe}, {{@in6=@private1, 0x0, 0x6c}}}, 0xe8) creat(&(0x7f0000000080)='./file0\x00', 0x106) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x0, 0x40081, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') preadv2(r2, &(0x7f0000000580)=[{&(0x7f0000000380)=""/72, 0x48}], 0x1, 0x0, 0x0, 0x17) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r3, 0x7, &(0x7f0000000600)={0x2}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) unshare(0x48020200) [ 538.277686] FAT-fs (loop4): bogus number of reserved sectors [ 538.278962] FAT-fs (loop4): Can't find a valid FAT filesystem [ 538.353871] FAT-fs (loop4): bogus number of reserved sectors [ 538.355301] FAT-fs (loop4): Can't find a valid FAT filesystem 04:59:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:53 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:53 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:53 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:53 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(0xffffffffffffffff, r1) open_tree(r2, &(0x7f0000000280)='./file0\x00', 0xc01) unlinkat(r2, &(0x7f00000000c0)='./file0/../file0\x00', 0x0) r3 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = gettid() kcmp(r3, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000140)={0x3, 0xd3, 0x4, 0x81, 0x1, 0x5, 0x0, 0x1, 0x5449, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x7, 0xfff}, 0x14201, 0x401, 0xffffffff, 0x4, 0x7, 0x0, 0x3765, 0x0, 0x80000001}, r4, 0xf, 0xffffffffffffffff, 0x3) openat(r0, &(0x7f0000000080)='./file0/../file0\x00', 0x91b256240d8172d2, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000340)='./file0/../file0\x00', 0x0) symlinkat(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file0/../file0\x00') creat(&(0x7f0000000100)='./file0/../file0\x00', 0x1a) 04:59:53 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 04:59:53 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 04:59:53 executing program 2: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:09 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 05:00:09 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty20(0xc, 0x4, 0x1) getsockname$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000280)=0x6e) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{0x7, 0x3}, {0x495}, {0x7, 0x7f}, {0x0, 0xb6}, {0x3, 0xd6}, {0x100, 0x9}, {0x7, 0x7}, {0x7fff, 0x1}, {0x6, 0x6}, {0x400, 0x8}]}) write(r1, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCNOTTY(r1, 0x5422) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r2, 0x541c, &(0x7f00000001c0)={0xd, 0x6}) unshare(0x48020200) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:00:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0xde, 0x22000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)) r1 = open_tree(0xffffffffffffffff, 0x0, 0xc01) r2 = syz_open_dev$sg(&(0x7f0000000240), 0x4, 0x40140) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="300000006f0700030004000800000100000000000000040400000007000000000000000002000000060002db0000000010614f760861705cc16617194e6ba4ceb0bc521816ad1b44fbfcb4cc145a284fa66f66de157fe23e86bfdc3f99192fb5ee48237f5c7c7c1a5870f4bf39b70821a8d2162c902581f5985e8ef8df6587be6ed71e8600d19ffd71bed6b9e193b0f8bb362a27b5964e4e3cfda9a00116c859fc69b3284b30031d72dff69d73474354af0b2a2a3f1ddba7c3a5f55a8c3cf579e1e13f5475d430286e07eb85ba2164de591499e920a39e06f5c9"], 0x30) fcntl$setpipe(r0, 0x407, 0x101) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000002c0)=0x1) unlinkat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80, 0x84) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x17, 0x2, {0x7, './file2'}}, 0x10) accept4$inet6(r1, 0x0, &(0x7f00000000c0), 0x800) socket(0x2b, 0x6, 0x5) r4 = syz_open_dev$vcsu(&(0x7f0000000300), 0x3632, 0x8000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r5, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) 05:00:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r0, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:09 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:09 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:09 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 554.387495] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 554.452372] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 05:00:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="646174615f6572723d69676e6f72652c64656c616c6c6f632c00eed60704a055b98bce3a1efc1e7a80ebe27cb366bf"]) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140), 0x1000, &(0x7f00000012c0)=ANY=[@ANYBLOB="7472af47733d66642c7266646e6f3d", @ANYRESHEX, @ANYBLOB=',wfddo=', @ANYRESHEX=r0, @ANYBLOB="2c00a9c1b9aaf2f52595317d5478d1af8e379abe9acad3b710221a489fa1d543cefebe39ec0b3b031685ce908a06e51ba973522315832206bf7a131bf767329aac93ff06ea3c17e64b17f989146e97bc64e21d51ddd23c74b0266c23984f0ec2e67005"]) open_tree(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x8000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="e52ef1a3fa36e399239b154a2561cbb2", 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept4(0xffffffffffffffff, &(0x7f0000002380)=@nfc_llcp, &(0x7f0000002400)=0x80, 0x80000) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f0000004540)=@ieee802154={0x24, @long}, &(0x7f00000045c0)=0x80) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000002c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000002480)={0x0, 0x0, "7ce145fb7781747bacefdb6f76471a1128113da03440be4d03cc3f6c46bba43635289893211f4c79de63ff21edc8eacbfa52b3cfcfde0d6d69390a0771e46913d545bcd00b60e6b820c2e4cd8eb5488544110fe412b80fb38ff9309f58ae7040c28e805fb98b08425e479bad81aa9c67763399d5b1a74a1a014bd172735edc22aee7dbaef85e68bc54f9a5855520d80a73d02a7ce75ae644442c4f1a2214a5bf1841133ca810ccf0011cfc02b23c3c03bf631b1b4668da1652f689158ada58a758316a3cc13b2c75a3d513316ace9f2f5976fd3566f8a7e93e3caef13ea8268e8efcdf743e00badf0b813fa55ec2eb6803ef2988d7210b0570ee31005ed68e05", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051c00)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x1, "e17e846695407d"}) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, 0x0, 0x0) open(&(0x7f0000000280)='./file1\x00', 0x200241, 0x10) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x1000003, 0xffffffffffffffff) 05:00:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r0, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:09 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00", 0xffffffff, 0x403}) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000140)) r0 = openat(0xffffffffffffff9c, 0x0, 0x80, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x22003, 0x0) ioctl$TIOCGDEV(0xffffffffffffffff, 0x80045432, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r2 = creat(0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080), 0x6) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040), 0x10001, 0x145600) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000540)={{r4}, "ff78cc9fc9c5f6cb348b8fdd88bfdfebba05ff69982fc86bf0cedca08790af4e75bdfd244b579f35316ba29dbd0b49023a50e14a336e6448526c2790e8c6ca9a6b2de08bda8141d79e8cb98fb9aed231f6c35e578001898ad260dc3225d7a4c4ece080ee3613c76897faef2f04a629912a697b0774604226ca78ed8e44ec737d024a1ad485796d633c60cfafa2cd658287f09101fb4622896768365e263bc4934ad2b4251c75567c50d612d204717db714d8253b22e7fa603de7e3537aa5659a06f08701a033bba5809b8d2fe0aee850eaa4d62f700fbe68d6fc1c59ca9939b76cab9f52269ef29fcdf87f75dbd9d8c896f631ef9125f03dcff21184fe38f616baf28c79f948d57d6d1a7cde7725595b500c59c278a62f1f1bb155fff5a53266f63545536c3dcf3cac7d67f23480abb15373c5a4972364a07c9097f90ba23eebb6fd033066c00b32e6cc9923d62775fa53103e69bd91a30ab4d0e4c615429156502175fbc5166d07dbffbf380a472f67da3e7931a02d2e6879726353ef056fbbbe67b2ce0d2e671104fa5f6c2a3000706bec984aa19114b21f50d00e5860c721463692dd978d5ac191cb330e14be15754c626a9906d02f2bf1edc647205fee4560f635cd88a44b7fc0d78c238e4c011ccfb633db4695fc604eeee558c6eadc05beed2e71f504237a444f866d903a7672c6c0d23b9c887f7f521ac1e26c97485ff71c694a00ad3e947e9a9d15212bfc7156e161c4ed1de1287eb49e3ad1577003a36ab07506c1e4e6877fef6211af2b1c4c8dd36dfe9074d2cecfbe1a7e77ea20b489d6f2eb4a3f86f50ba4b921dc244bf9ccdaffcf396ca074b895fddb60a7757220af072fb45dd79544ad6c85f42e4b5b4f8a0e2a8d825dd6b7a047c9b996a424d863c5893f635fd41b0f215f3907a90ca0b2e53c7177b97e2b8b4732f4ca6b9d4b7873cce269b33fd8df8abc2a92bde5a58e12de21182c216efe58e5b9830255cc51a1accd39c625e01ccbee4af018aedbfdaa2ecbcb16f7ae65d01002c90367e98bb954b3f837c11d9d88262b6d63f64fee2ab7188e8be37baeada855cdc0457be5eeb1f305d05565edc554e94e5c381c588b31fa0d7c7b61ed18bb87c60362dee201f8a8c261c30ce37fe9baa75aa77a9a2185c52abae2a3d8bafc4a6798c8ebdffa0bf02f42ca4d4599f3573f8117e5796718db870e79078fa2f217f3df3e8545d348a5b6dabaf0960d2335bbf782cce328ad5ed37988eb43a312b85a2481a0a3f74cfaca2edb3daad4c7746be918e97cfae9eedfdfef6b151bc39d24bda710d018a648a45e86184f626fa8ee1d7cdbb535056fec1e83239ff4cd4d80e2de5aa053294b29f32ce1a608a014205d40cffef1cedb35b23989340cd05d05ae8060aa0bd995dcd011571b9000117334f0ff342c4a69661787922bf6e8ed4cb399882c86b811d91f561789c26bbeca1a23b014ebbfe01ef6bd1cac0d24432fae526de9e0307d7ace5308857c64bca395b995b92896f509114fa964aa6ac5c06547d6eb8f26a83f6f09691169f472bd2e589b277c828b6f825c8b30b1303bb6369e80307a15566f05a8161db1ceee894ac09f4a32f129cd358e592b686493395f623242e9e992445af8774d54533dd4a6b1540da187c0cd98fe9957284bb2941f73efdc67442874d5eb942436f7e8e81d89810fa05212e818161b152ac2161e613e2ce3e4e962468262318f24e9fc98db326969cbe1aba9ffaacc296fc136b94536a3948831313a09ce48ab9345d707124e3246e77d514e5bfc9c9f4e84ca7c10806873000fb41ca5f0661ce8207aab3158279b0ba7d03efb8d546f6f7ceec01fe77451c1b8f8a744d6dae79a57145bdd8a501718abfc93727db9d8967f2ec00b7f454f0edc8f2ccb2fed318ad5d729b6b53600a2a8b43323eab717b9bec23302a93e89d96f875bc5e74a51859b7f98ee52f60c617422d3eb67952fd83995f1eb28a3a142dbb48b914172d914220cede0d9fc54c7ae134c27fed1324a9fbad69d92914f1992b70298e643324a7f8b34ab05ed57f443cb36eddc7b37174eeac727a3cf55574508eca309ac2938607e0ea02e21549143bcdbce6da5d4a2dd4320197cd661b5c6abda843d54a1f1e42c20d22fb29e7d7611112a75e4646f306a95ae221f4bed2f21afd4734bfe0ef673e8f9ec359d786ffcd2a0c98f5bea35a15d898cf97bc457d0c46add345c10849c4c01eee566209ceeabe0cd0be6b7f75dc3dc3e345cf0ad88cca4c99849d8a7f263b00ab371997743a6b35d5ae31a78228bc33fe2bdb8b481d4893b747a827788dc57b2be2949ba8d7e18e1935775c8ca2eeb5c3cd73ddeeef026f3ed129395dd2aab81e2cb3837e5c5da3ba51c43dae37235b7c58c7b6fee8256910f3a26bd5ce82f38ba0ed2a401395f2317f5638636c1d22c35676c4bb3d1df04f92d0505d83488c7ed024681133d7bfc35158ecc99de71d3700b3e238817d446bbfa27e0b1ead26e8978e9759444d81d947deda3784b94c10b1ae3a6ebe6fcbf9a1b5b5719881f3032bf9dff183ac5f08876c12515d42625cf1a87dbb67f34d159b444e6ce7c90f3f6c55d7000d06f3606a41e463ee182a5836e9752d7f77a29789e2c8fff6f120f851bd941fce3c84068e6cea22402e3187db4814d94e8971a7a4304952354e4ebdbee6489f27c61deaae4f67137a7c3cc047fe24261d255f2c92eaf8a24a8b93c7354833972606ee0cb8491c255e8a9f0d0f1a8c763b0f4c86c30f21b049a286cb868342fa2126d0da9c8f8e8f05f926dc2937d59ffc721a9749c91e31e2514c83896db8e1e9e387533d2669bf7c35d2b6830ddfb0ca47fedd649389aba7ab76e2837b9526fb016a578059ae2b64f7d64bda20aa0782c2b1c50dffd78d824518118ff5eafddd9c378f6b169451f412bef858a05a6ecbb44721ac1d63f34b602477a615d44b685ecdaa6fb918807e8f86654ab8c084a850dc4d7f7884a671110354301e4a863026d5e8de8cf9625ad92315a724bfbf0d157133e77dd418a1eee19b6f6247e2034b226756479a5f2ade1de66a045354e5c59963abb6893be3996a932241cd0ee42a060d980260d4d01e7ed9863020c05162a0629a42c832506f35d626a68eb6e170e4fac87a915a7c7d90a29711cb6042c4de2882b4080c4481250970c4d0bd718a8b401ea655c120a8150a07575ca7f45922587c76744c5a3453ff7a067c3c0e7e0250a19241b0def317dfba3a7a8d5c54225df9fc2f7cbe68838728f460bdad8504212b4663439aa5086e8854b1180bcddbda5fcb7417aa80819f1cc0b18e468b87987a88d701ea6897352b884e55b8bcba8d4cddb4372da5682de3e21204d23a2a241c49b0196fbd21c5027a7cf8f60c10779e93fe91f44ddc4f1f8726336b6c1df89ff9df216b144be343dd1dafd54050bdbb94a472282a1d7a4c3104605bd93603a5902a77540de1a17c976f4c8686c19fe0610257d5f106d0972a5fef0ce5793ecf7475186091e7111e4b8fdd405318892b11ccc698cb2b5f88efa0e32660af8c67f9d7828881417d0794fafdd2c0b71e3b1748905cb46f4a523afe72bed255eaa1889bd2c6f9415319f68cb74b5af4c56fd3528b5355ce9e530d349ba43d3ebeed788b3565d544bcbf0e946d3fc82c5dfa39785594d73891cc41369b0b932118f0c97af05d8d47049cfc718bd63568ec3c04247ead514b2aa0c0bf496713044ad6fb09293f03e1425e8df9a4d783ff2813f3d7325e77ceb1caed685a853d9b8b9e32f5f2a4a33634ef69e5f1f7a28dca1603fd1a919f8be1f9181885fea2eab066c4152301be9f68231cc5acb13816a57c3a469b88676211bfb72daf635c7fa01cd9d35d20f916bdf546e96cf47e1960bca39d26f7523d5673662d831862ca7ed0b560f7a4b6b19553ec3486b8cfc44b32f125bb1be31463bec493df27d8de4f209bec28aecb8de58a730b4fe56f44f02d69cafc31fccf67f998bd7e382045cd4ff12ddef8f40855a01e6d77507255c172e574dfb69aeeb5819fbc15e7bb184af4400a98fda9e13ff928f93ae42dfb9d8f7505d524a17cb11b19288ff9d8860a8e7db50371c53105651b4e0bad8970fe470667b791b28b1a46cf4ba729dbb52a7e873761e766e657067c0574286107eb47025a9073264252f5a0e82c7d7f3b0842ed05d77338c4b77a477dd132b920379e2b0b42c879ec734a4521a7e6db5c32ff3c43a648ba2c649c3cb023bb83c40e340b7bc7ab0d3836352b8a44c91276b96a8bd4f83b33357123810602d37910760385379921b220fdd6684c906feec379eb5d6879c8fd84810b2e011a65f968bea022e3b229b59c251fea6208355e9e1474a2722b9e290dedb38975fdd150b970df1cc7b69a24539135510193d8000ebdbb4a67fd510807e64a7c9d9ee69ed943524ce0574d5cf4437ae79ba81d4a189d262b57dcce660496b7a7d073dafeade5dde10918593063840299b6e238ec385e76c24bdd8cd67f4a18eb2c7b6f4629bf63e6dccc491ff8b2984d070107497a08b4b1f2a81dba3aef4f672cbe51d66b670c776bb338ce5375883990d4f436f4072297543a46b9bc3b0133e9f92bd6037026c67ea22e177be751f4874551470f52413a0e107ae13227901b2d71e756dc8cbd57a66687c7253e994c0704a5ce39874a28a83957c11a540a9c150dc876944fa421e8f0d12b1f444828dd7466e5997598838014ab3063916bf94756765ebf4ab811c9697dcb7f8153d10c8e50abcf9a2640146c6d4bb9a77d79e7ca63ac5b31aee10583e0656bc6baee5bc567b4ee09df4e658f12db427ec676377107524a35f6e12799d99dde0e2f6516189420bbedd6fbb0021c519613a2701117649eadab43fb9202686b8bf0e9d501143677811dff6e8fca763a5fe1db8187fb3f02e7098dca8727599a7b560877f71686e7e0e9e4c17aed8869d3b890c6453e6e65354b1d9a4ee5fcc1c402fa4cdb03c4e0f071f75e385609146e82535778bfb6593246649bca8146bd3437c888479af1126f1f79c33f299f5c7eaf76171d39bdd605d7a2456b60a3343454993c43fbd924a9838be7d831bb0d9fab70f84c88f83af3dd81044b2b11e366a8ccf63e1078ed0829c68d09f4acb34ca30259d3d0077111d31f6de9462e9e49800fca0a47a92716369f176ace7174f676e4bbf8c1bed0739e3cb2f08f34bf006269287e6cdfa566cee8691cb5b2d77b8187a562f7695d919b0aaeb25a266fe2db74a403f917634c68f5bbe8e30a7051d66d7763e7a31fbae36aefb5cd276a8dcad96739954547900d34d597559d5e21330dd8ebc20524cdcedaede9c42dfbfdd65257b87e2a96b3ac0d5967dbbc6c1becfe26c83a59ee905468c41a816601c6f6df6a688ff92061e7085733e84b719c83aee546a9716c897b96d57677e7e2c206d906fc0170b1dd287f068fb21a6f6f458873257fc1ec94c059fa8a065926e4f1a0084dadcff79d35079f24b60c440b06c3ea6825674579c5717ce391cbc1e1e5ef096e89ae40f86bfbb797310738e2542c14c7d2be3d76ba5888183bf990b93e9fc2206fa758560c11bcc7abcfa8507c5ba08ef4bb8ef02ed0a1d29a813268cf629423b39328e7c7db1f0b2fa5e01760455c6e679562a4fb49fb3fd95876370cb4c94cdbac81298a21d06ed8a869e9444100e840f78f8d96fe5c7f60e37b6c509823f18fe2c112a4ca8ae00625b41f9046636f2d0cc831f7979f5bd047485cf5c1ff3afeb1eb0"}) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000180)=0x5) r5 = socket$inet(0x2, 0xa, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x7) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r5, r1, 0x0) 05:00:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r0, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:09 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) bind$bt_hci(r1, &(0x7f0000000100)={0x1f, 0xffffffffffffffff, 0x1}, 0x6) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x103100, 0x0) write$bt_hci(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="0137202300080505a654b9d8b8e4000a0f767c102a220b9c349894c2a300040000a9b25e7105cd9c75e94c9c8747f5bc8206b401330d4bc548a66f7fbd55730a0d96da37ad19652668ef57b7f30b2e631972bbd5fa48db022431b4cb7db6fd6fcae9b950bbf05171a64b833d8de8e1ac7936b6769fc013f472469ae9ec703418df6f6679e1794be52700020000a591e6ebb7f2619c00040000cd07f08de346e1a356d808de7558cb4f14299d3f15e3f8427f7eda83afab3cc8a1f031243cda71da797b9b8c26efb03b"], 0x27) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r2) write$bt_hci(r0, &(0x7f0000002d00)=ANY=[@ANYRES64=r4], 0x6) 05:00:09 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 554.957992] EXT4-fs (loop4): mounted filesystem without journal. Opts: data_err=ignore,delalloc,,errors=continue 05:00:09 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_DELRULE={0xe9c, 0x8, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_RULE_POSITION={0xc}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0xe6d, 0x7, 0x1, 0x0, "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"}]}], {0x14}}, 0xec4}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee01}}, './file0\x00'}) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, 0x0, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x2}, @CTA_EXPECT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 05:00:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x400000, 0x1, 0x7}, 0x18) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000180)={0x10000002, {{0xa, 0x4e23, 0x6, @empty, 0xffffffff}}, {{0xa, 0x4e23, 0xfffffff7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfdfffc00}}}, 0x108) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x3, 0x8000}, 0x4) gettid() fcntl$getown(r2, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) capset(&(0x7f0000000100)={0x19980330, r4}, &(0x7f0000000180)={0xfffffdf3, 0x5, 0x2, 0x8000, 0x9, 0x6}) r5 = syz_open_procfs(r4, &(0x7f0000000340)='wchan\x00') ioctl$sock_inet_SIOCGIFADDR(r5, 0x8915, &(0x7f0000000300)={'wlan0\x00', {0x2, 0x0, @initdev}}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'ip_vti0\x00'}) r7 = dup2(r1, r0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000380)={0x100, 0x0, &(0x7f00000002c0)=[r0, r0, r3, r3, r5, r6, r7]}, 0x7) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r8, 0x400c6615, &(0x7f00000003c0)={0x0, @aes256, 0x0, @desc4}) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000740)=0x1) 05:00:09 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:10 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 05:00:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r0, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:10 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:10 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x400, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x17, 0x0, 0x0, @u32}]}, 0x1c}}, 0x40000) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x8) r1 = syz_open_dev$mouse(&(0x7f00000000c0), 0x7, 0x4002) r2 = dup2(r0, r1) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x2b0100, 0x1c}, 0x18) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r2, {0xfffffc71}}, './file0\x00'}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x404700, 0x0) pidfd_getfd(r3, r2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000004200210e0000000000000000000000001ec1510446ad9e06b57f9c686fa912ba3b2328a522ec336899b707fd6d050000000000007c8b1bf0464349f5bab057d519066ed1d98d6e5fd1c5fa0cf73e0c2d"], 0x14}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001740)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 05:00:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@nojournal_checksum}]}) sendto(0xffffffffffffffff, &(0x7f0000000080)="ab71ca602a1fcd46bd5f9e8532bfb93f9b8effd0d8bdc626140408526189bae99e74bc30eab7859f0ffa91011e451b3ac731472b1af105891aaecd3fa838238e8de2c043de0019faec4ae4da13666a81", 0x50, 0x4000044, 0x0, 0x0) [ 555.310360] EXT4-fs (loop2): Mount option "nojournal_checksum" incompatible with ext3 [ 555.351311] EXT4-fs (loop2): Mount option "nojournal_checksum" incompatible with ext3 05:00:10 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:10 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_setup(0x7d39, 0x0, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r4, r5, &(0x7f00000190c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x0) syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x111c01) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000500)=""/170, 0xaa}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/1, 0x1}, {&(0x7f0000001600)=""/7, 0x7}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/36, 0x24}, {&(0x7f0000002680)=""/114, 0x72}, {&(0x7f0000002700)=""/31, 0x1f}, {&(0x7f0000002740)=""/237, 0xed}], 0x9, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203, 0x1, {0x1}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 05:00:10 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:10 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:10 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:22 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:22 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 05:00:22 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r0, &(0x7f0000001100)=""/4095, 0xae3, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x0) recvmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000000c0), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000140)=""/91, 0x5b}, {&(0x7f00000001c0)=""/88, 0x58}, {&(0x7f0000000240)=""/148, 0x94}, {&(0x7f0000000380)=""/111, 0x6f}, {&(0x7f0000000040)=""/39, 0x27}, {&(0x7f0000000400)=""/230, 0xe6}], 0x6, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x12062) fcntl$setstatus(r1, 0x4, 0x42800) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1d012, r1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x215000, 0x101) 05:00:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:22 executing program 2: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000016140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x123040, 0x0) openat(r3, &(0x7f0000000200)='./file0\x00', 0x81, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r4, &(0x7f0000006980)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10090000}, 0xc, &(0x7f0000006940)={&(0x7f0000006880)={0x34, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PAUSE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa0401b8}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x90, r5, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_EEE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}]}, @ETHTOOL_A_EEE_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000016580)={0x0, 0x0, &(0x7f0000016540)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01000000000000000006100000001800018014000200776c616e300000000000000000000000080008"], 0x34}}, 0x0) 05:00:22 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:22 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:22 executing program 4: r0 = syz_io_uring_setup(0x34ad, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = dup2(r4, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r6, &(0x7f0000001100)=""/4095, 0xae3, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x42, &(0x7f00000002c0), &(0x7f0000000300)=0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r5, 0x0, 0x0}, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xa, 0x30, r5, 0x10000000) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x800, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000340)={0x1f, 0x4, 0x1}, 0x6) syz_io_uring_submit(r1, r7, &(0x7f0000000280)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x3, 0x0, r8, 0x0, 0x0, 0x0, 0x10000, 0x0, {0x2}}, 0x7) bind$bt_l2cap(r4, &(0x7f0000000200)={0x1f, 0xbac, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x1f}, 0xe) 05:00:22 executing program 2: msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2800) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) msgsnd(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00'], 0x8, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r2) r3 = syz_open_pts(r1, 0x40000) write$binfmt_elf64(r3, &(0x7f0000000980)={{0x7f, 0x45, 0x4c, 0x46, 0x13, 0x1, 0x8, 0x8, 0x4, 0x3, 0x3, 0x401, 0x301, 0x40, 0x1b4, 0xa8bf, 0x4, 0x38, 0x2, 0x4, 0xffff, 0x7}, [{0x6474e551, 0x3, 0x4, 0x8, 0xffffffff00000000, 0x7ff, 0xc02, 0x8}], "19cde242df0c83f6d8dbbd90210a5bb6fbb38f37d61ee4f09f3ead54596a244e365b4bb84d00ddcb71c974dc10ac7aeef49114c0d298f7fcde6b9760b6085b40240a53f53818c3356bd35e0f917697169494ef6ca98d0e12a088a7f4b863e7f1d00430a603c6af324d77eb8a4d96", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xae6) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg1\x00'}) copy_file_range(r1, 0x0, r2, &(0x7f0000000040)=0x7fff, 0xa1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x2c, 0x1}, 0x14}}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000580)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) lseek(r4, 0x80000001, 0x2) sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x3e8, 0x1, 0x70bd2b, 0x25dfdbfb, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x48894}, 0x50) 05:00:23 executing program 7: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') getsockopt$sock_buf(r1, 0x1, 0x3b, &(0x7f0000002100)=""/4096, &(0x7f0000000140)=0x1000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x0, 0x23, 0x0, "05e402781952f6206c603ba6406d41766d82c1714602638890ec02f9e9cbda8cb43da538855765a4348519c792aeeed07006251e6f9ca89ed129c0e17027887cbda20f738476b5bb2e123c016b92bff2"}, 0xd8) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x80, 0x41) shutdown(r1, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x200}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) 05:00:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 568.498698] FAT-fs (loop7): bogus number of reserved sectors [ 568.499952] FAT-fs (loop7): Can't find a valid FAT filesystem 05:00:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000001600)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$hidraw(0xffffffffffffffff, &(0x7f0000002680)=""/189, 0xbd) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000180)=""/248, 0xf8}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/164, 0xa4}, {&(0x7f0000001340)=""/134, 0x86}, {&(0x7f0000000080)=""/26, 0x1a}, {&(0x7f0000001480)=""/181, 0xb5}], 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r2, 0x3) dup2(0xffffffffffffffff, 0xffffffffffffffff) lseek(r0, 0x0, 0x3) 05:00:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:23 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:37 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x40, 0x0) mknod(&(0x7f0000000040)='./file0/file0\x00', 0x410, 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x400000, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r1, &(0x7f0000001100)=""/4095, 0xae3, 0x0) openat(r1, &(0x7f0000000000)='./file0\x00', 0x4000, 0x8) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x2}) 05:00:37 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 05:00:37 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x2d8, 0x25, 0x4, 0x70bd25, 0x25dfdbfc, {0x3}, [@generic="34559770b40c8876bdb1b07ed9be5a51835f4107aa6c54aee00b11a97864c4fafd4628ea22056bef3f27b16752fe46972863192eda95", @generic="be2ac4871ef098b8dd40375526419383de394ca80b145251e0bb7361885288b9d3", @nested={0x26a, 0x5, 0x0, 0x1, [@typed={0xdc, 0x58, 0x0, 0x0, @binary="60f1b1ef57c513422fef27937acd91454271dd980e5551e6a4b3cf1cb254cbb387b1af048537b616dc1692815f0bb9b67fb7c2debc55af42b90ed46ef5268aec030f681aab19f16e9bafb60dafca1862da7b8056cef9bc8f68ab2ff6c08bbfc11518e859596e529bb2a0cbe2e293128850da948e424a2aea1bad6ab3041d9f95cee13fbdc34e6b743b7f9d431d8036093da20cedf0e9a4dbe2dbf0e7006ee28a504c3eb527ad607eb6579f964ad8a795e9c00d10f61f4e8f6896f6fedd4078b987ba4e11a0c57f547c791953077764fda42f7d360c3754a7"}, @generic="2ca2ce7876ec2fce31b5557685be0a27d1e8a3901d6eca6ab78aa82bc93956361a89fdb1195383fff77295b574612ed42aef19d65e33b0c90c16a6b87f149674b65d1fce251a3d46daa94b48e755357ae679a25821b62aa3a752be7ae7bc41407ce03ffc7465ed30d925f8753de7aaf7911dabf6e3e4519878950148a28acb92ded8f5a0106346907b46659ecc", @generic="6e9c8e76e7597fc536074eb75f8f9e6cf425ddaa9c15f686b103f1a6f14b4929dbdb804af0ceac3d580db7c39b53a0734283a9c7d9255ea27700675e533533458a91ee821ab0b88013ced8073882933b4db14cbd790a652627a22ec45396e636f8a264824418091b600ae1db7244a8fd44ab687e1bc313623d1ef0ddb106a4c89262d7240fe7a03b56a77207270397c982226b02d2241837be666ab33c73b1bafb148644da0475886be6b2bc67dbb42c1ac2187df08c0d4527823765e2449cb5644e16fd0f5d6f63886d2d2a8134fe408e39cb83149417b2f62f0b929984c96ef2dbf5ad7dfc420dce6e2df968", @typed={0x8, 0x1b, 0x0, 0x0, @u32=0x6}, @typed={0x6, 0x4b, 0x0, 0x0, @str='#\x00'}]}]}, 0x2d8}, 0x1, 0x0, 0x0, 0x8000}, 0x20000080) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c0000001500010000000000000000000a00000018000080140001596600fc0200"/44], 0x2c}}, 0x0) 05:00:37 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:37 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:37 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="007da1804886b1655e09966a7e07c44fecf87834ecdbb6650240e9635802006dcb1b3d4462fe59be4c704b17c759b22d78c09367f849dcb8494ee15dcf7d0932dbaed64f8c680c37873c7d65eecdf0eaed8aa6cb52ef5ae7ab35864fec9cb6832dcf658d3b207a59e9d55e0757fcf48c97ef843f7e"]) mkdirat(r1, &(0x7f0000000340)='./file0\x00', 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) prctl$PR_SET_MM_MAP(0x39, 0xe, 0x0, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) mkdirat(r3, &(0x7f0000000000)='./file1\x00', 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000100)={0x9fcf, 0x28, '\x00', 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfff, 0x6, &(0x7f0000000740)=[{&(0x7f00000001c0)="1b31dfab975414c1f2079fa9d7dc741f0b1bc56fa3e91a16a5c39d8be04b", 0x1e, 0x401}, {&(0x7f00000002c0)="b386ccc784a43f0767758f9b897e1e8fc5de06814e746c0bacb83d1ff9e1c5b2748753e2ae15d9379401ba0dff129d71dc3f5e6be27813c94467c627fd60b219b3297382ced5557acaf4dde75fcb106f531829bff295b3", 0x57, 0xd39}, {&(0x7f0000000380)="c85732c78de93e2ba119dde4b2e88b5ccf2932c9e8f1defece3c9e5ad5cbefbbe3f7f08c0f0000fb397f6324a25b963ffb1be9c86d909604b67b8160043d71910ebaf6f06fed76659340c267e18aeff9ec25444e6ff3a50f38889b8d059d7a00183861705204768944cac2e14fadbfde04f0c1d5cdcdb7346033ad3c5ff99cdcfd90cbbd0f8c64399961977d784834022f8f951690305b3955136a7dce3388860acba14727f64242069302e841e4c1808e614d127473ec44bf83475f24d2be020862af492899cbad24b9a57e4d17f9f8fe", 0xd1, 0x7}, {&(0x7f0000000480)="a8d09214379531ac29f0ab285c8379ef6b09f5eb50f79850acccd80513ee5f962afebec2d210b86c97c4913e0d59c75f0180ded459b62cf8632b2f57d7748a7a82488ce50bb67f54def194349c0d0916bd35a75197487da9b6f87e3467147689662031208c7d0fc25abd3366b8fa9ddc2c38b3e74348d926f65dd0f3ffcc5ddaed016dede916882f8825f0c762030a580567932e268967e9f2f32e0fed4e478357b3f8bb49ba7eebaef5ff1ebb09771c1007b8d5187c51", 0xb7, 0x100}, {&(0x7f0000000640)="b0b85bcd38f74de0a326ddd291fcc1911668314bb68ecfe0a97ea840d08161e70c72a6c8fd285694966d4c3677105b8af0b440b6306ff076d82461d867d0b7e7df04643cd261d8ebff9ec218423de59dd36e3f36fe52abd770c77b8c7418d80900ad5a8d63a7aa1e1d73507c451b55d525c6873de061d59772191305aa18057f9d217abf990c2ab34c46da45300e098b3490479f827c92beb349d40d48655170dce4320804b0fba71c39c6538ae1de6a664d80fd30fbd128eb19b0c91ab5beffca22e0646e731aa17e29245ddd3ef8fef4cbe520d575725859bbefd9b84102d994a4c269fa15454ae1e3803d10ee4a8003bbd79a16dffa790797be6c", 0xfc, 0x1}, {&(0x7f0000000540)="bd12890e60b3aa0e498b6d93d83d73203d5827f13906e7754dc6370cf919b1f636e9318ee7180aeefb45470aa6b2ce53f576bc075a85584319042e44bbbd9df0a0afcc4ced07a4e27165cb0951487781dd840763087b94b452499e773ab03eeb0d6986d8b6a2110f", 0x68, 0x5ae}], 0x40000, &(0x7f0000000800)={[{@nonumtail}, {@numtail}, {@rodir}, {@shortname_mixed}, {@nonumtail}, {}, {@rodir}, {@shortname_mixed}], [{@pcr={'pcr', 0x3d, 0x3c}}, {@pcr={'pcr', 0x3d, 0x33}}]}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000240)={'#! ', './file1', [{}, {0x20, '+[-+\xc3'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, 'vfat\x00'}, {0x20, '\\'}, {0x20, '\x00'}], 0xa, "2bbafb9d871e8a182aaaa667a7c4c9da64386a63f6b22e89b8dab7a5dbd814e3a1206dc7f2870f"}, 0x49) unshare(0x48020200) 05:00:51 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:51 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4c50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x3000000) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0xc2000258) rmdir(&(0x7f0000000240)='./file0\x00') ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xae3, 0x0) openat(r2, &(0x7f0000000000)='./file0\x00', 0x101100, 0x80) pwrite64(0xffffffffffffffff, 0x0, 0xeffd, 0x0) 05:00:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000300), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffc}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) sendfile(r2, r0, &(0x7f0000000000)=0x1f, 0x7f3) io_submit(0x0, 0x1, &(0x7f0000019380)=[&(0x7f0000019140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000019100)='a', 0x1}]) 05:00:51 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = dup2(r0, r3) syz_genetlink_get_family_id$wireguard(&(0x7f0000000280), r4) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="03000000000000000a00000000000000ff010000000000000000000000000001000000ed0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a00000000000000ff01000000000000000000000000000100"/202], 0x110) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000000000000000857e000000000500000000000000", @ANYRES32=r1, @ANYBLOB="000000008e00"/28, @ANYRES32, @ANYBLOB="000000000200"/28, @ANYRES32=r3, @ANYBLOB="000000000f0200"/28, @ANYRES32=r5, @ANYBLOB="0000001e00080000000000000000000000000000ecf123989b98e7d114b4b0b25e4955e7191bb6029535be8e558b2f1003ff53a195dbdc461653331e5d8a32c62f980b5975d2d0b127f62f0fdc1f3852630c42b9f2a627884e0756b69e1a2923888d56f3469a0304911d0c4c1147750ffaff92c8", @ANYRES32=r1, @ANYBLOB="00000000ff0100"/28]) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x0) close_range(r2, r7, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r6, 0x80047210, &(0x7f0000000140)) r8 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r8, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) unshare(0x58040280) 05:00:51 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) 05:00:51 executing program 5: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) socket$netlink(0x10, 0x3, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 596.798815] audit: type=1400 audit(1684386051.651:32): avc: denied { create } for pid=5991 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 05:00:51 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:51 executing program 7: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 597.052426] perf: interrupt took too long (3231 > 3163), lowering kernel.perf_event_max_sample_rate to 61000 [ 597.211050] perf: interrupt took too long (4050 > 4038), lowering kernel.perf_event_max_sample_rate to 49000 05:00:52 executing program 4: syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x76507) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x1000, 0x0) syz_io_uring_setup(0x2, &(0x7f0000000180)={0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x5000)=nil, 0x0, 0x0) r2 = fsmount(r0, 0x1, 0x8a) read$usbmon(r2, &(0x7f0000000340)=""/58, 0x3a) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r3, &(0x7f0000001100)=""/4095, 0xae3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') pread64(r4, &(0x7f0000001100)=""/4095, 0xae3, 0x0) fcntl$dupfd(r3, 0x0, r4) socket$netlink(0x10, 0x3, 0x6) syz_io_uring_setup(0x4bf6, &(0x7f0000000200)={0x0, 0x7ab3, 0x10, 0xffffffff, 0x60}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) pselect6(0x40, &(0x7f0000000140)={0x100000001, 0x0, 0x40, 0x0, 0x1}, &(0x7f0000000380)={0x400, 0x6, 0x0, 0x4}, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400), 0x2, 0x2) 05:00:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:52 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 597.506077] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 05:00:52 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r2, 0x0, r2) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:52 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) pread64(0xffffffffffffffff, &(0x7f00000001c0)=""/81, 0x51, 0x1) read(r1, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x12000, 0x169) dup2(r2, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x8, 0x0, 0x0, 0x8f, 0x20006, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x4501, 0x3, 0xfff, 0x7, 0x9, 0x43, 0x0, 0x0, 0x9, 0x0, 0x7f}, 0xffffffffffffffff, 0x9, r1, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000040), &(0x7f0000000080)=@v1={0x2, "7f"}, 0x2, 0x2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000019300)={0x3, 0x4, 0x1, 0xff9a, 0x6, [{0xffffffff, 0x1, 0x3}, {0x2, 0x400, 0xe4, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x0, 0x0, 0xf9f8, '\x00', 0x1}, {0xb7a8, 0x0, 0x8, '\x00', 0x1000}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 05:00:52 executing program 3: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 05:00:52 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={0x0}}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'lo\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x39, 0x0, 0x0, "a579fd57c907"}}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001540), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)=ANY=[@ANYRES16, @ANYBLOB], 0x2c}}, 0x0) dup2(r1, 0xffffffffffffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000001340)={0x9c, 0x0, 0x2, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3f}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x8}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}]}, 0x9c}}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x409becb7bde85c2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) readlinkat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/29, 0x1d) fcntl$dupfd(r3, 0x0, r3) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/warn_count', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) [ 602.488507] Bluetooth: hci0: command 0x0409 tx timeout [ 604.536541] Bluetooth: hci0: command 0x041b tx timeout [ 606.584449] Bluetooth: hci0: command 0x040f tx timeout [ 606.751869] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 606.753338] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 606.755589] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 606.779331] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 606.780547] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 606.782305] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 611.512439] Bluetooth: hci0: command 0x0409 tx timeout [ 613.561430] Bluetooth: hci0: command 0x041b tx timeout [ 615.608431] Bluetooth: hci0: command 0x040f tx timeout [ 615.959661] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 615.961399] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 615.966197] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 616.002750] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 616.004419] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 616.006918] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 620.792450] Bluetooth: hci0: command 0x0409 tx timeout [ 622.840448] Bluetooth: hci0: command 0x041b tx timeout [ 624.888438] Bluetooth: hci0: command 0x040f tx timeout [ 625.173775] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 625.175751] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 625.178759] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 625.218077] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 625.219148] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 625.221282] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 629.944439] Bluetooth: hci0: command 0x0409 tx timeout [ 631.992502] Bluetooth: hci0: command 0x041b tx timeout [ 634.040491] Bluetooth: hci0: command 0x040f tx timeout [ 634.563008] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 634.564810] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 634.568541] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 634.613158] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 634.614864] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 634.617351] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 639.352453] Bluetooth: hci0: command 0x0409 tx timeout [ 641.400460] Bluetooth: hci0: command 0x041b tx timeout [ 643.449132] Bluetooth: hci0: command 0x040f tx timeout [ 643.994127] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 643.995894] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 643.998645] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 644.047016] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 644.048716] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 644.051493] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 648.888440] Bluetooth: hci0: command 0x0409 tx timeout [ 650.936464] Bluetooth: hci0: command 0x041b tx timeout [ 652.984458] Bluetooth: hci0: command 0x040f tx timeout [ 653.442772] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 653.445549] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 653.449935] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 653.496096] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 653.498707] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 653.502827] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 658.296424] Bluetooth: hci0: command 0x0409 tx timeout [ 660.344484] Bluetooth: hci0: command 0x041b tx timeout [ 661.481878] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 661.483908] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 661.486920] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 661.537444] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 661.539423] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 661.542030] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 666.232445] Bluetooth: hci0: command 0x0409 tx timeout [ 668.280534] Bluetooth: hci0: command 0x041b tx timeout [ 670.328455] Bluetooth: hci0: command 0x040f tx timeout [ 670.953854] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 670.955745] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 670.958590] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 671.024166] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 671.026029] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 671.029249] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 675.768484] Bluetooth: hci0: command 0x0409 tx timeout [ 677.816529] Bluetooth: hci0: command 0x041b tx timeout [ 679.864444] Bluetooth: hci0: command 0x040f tx timeout [ 680.265063] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 680.267162] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 680.270067] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 680.305103] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 680.307101] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 680.310105] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 685.048461] Bluetooth: hci0: command 0x0409 tx timeout [ 687.096541] Bluetooth: hci0: command 0x041b tx timeout [ 689.144450] Bluetooth: hci0: command 0x040f tx timeout [ 689.565078] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 689.567036] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 689.569732] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 689.617735] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 689.619629] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 689.623960] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 694.329441] Bluetooth: hci0: command 0x0409 tx timeout [ 696.377414] Bluetooth: hci0: command 0x041b tx timeout [ 698.424457] Bluetooth: hci0: command 0x040f tx timeout [ 699.009245] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 699.010246] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 699.012044] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 699.035612] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 699.036490] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 699.037748] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2023/05/18 05:02:34 executor 2 failed 11 times: executor 2: exit status 67 SYZFAIL: netlink_send_ext: netlink read failed (errno 9: Bad file descriptor) SYZFAIL: child failed (errno 0: Success) loop exited with status 67 VM DIAGNOSIS: 05:02:34 Registers: info registers vcpu 0 RAX=000000000000000a RBX=ffff888015ad5648 RCX=ffffffff8126a39b RDX=0000000000000000 RSI=0000000000000008 RDI=ffff888015ad5668 RBP=0000000000000004 RSP=ffff88801719f468 R8 =0000000000000000 R9 =ffffffff8685d76f R10=fffffbfff0d0baed R11=0000000000000001 R12=ffff888015ad4d40 R13=0000000000000002 R14=ffff888015ad55f8 R15=dffffc0000000000 RIP=ffffffff8126a369 RFL=00000012 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000561f42d09280 CR3=00000000385b0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=636578650a3a73656d69742031312064 XMM02=6174732074697865203a3220726f7475 XMM03=203a4c4941465a59530a373620737574 XMM04=7478655f646e65735f6b6e696c74656e XMM05=662064616572206b6e696c74656e203a XMM06=3a39206f6e72726528200a64656c6961 XMM07=69726373656420656c69662064614220 XMM08=72206b6e696c74656e203a7478655f64 XMM09=72726528200a64656c69616620646165 XMM10=6420656c696620646142203a39206f6e XMM11=41465a59530a29726f74706972637365 XMM12=64656c69616620646c696863203a4c49 XMM13=63637553203a30206f6e72726528200a XMM14=64657469786520706f6f6c0a29737365 XMM15=0a373620737574617473206874697720 info registers vcpu 1 RAX=dffffc0000000000 RBX=1ffff1100308dec1 RCX=0000000000000000 RDX=ffff888015be0000 RSI=0000000000000008 RDI=ffff888015be08b4 RBP=0000000000000000 RSP=ffff88801846f5f8 R8 =0000000000000000 R9 =ffffffff8566fd4f R10=fffffbfff0acdfa9 R11=0000000000000001 R12=0000000000000002 R13=0000000000000000 R14=ffffffff84ff7ea0 R15=0000000000000000 RIP=ffffffff81270b22 RFL=00000213 [----A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f78337a0fb8 CR3=000000001b1e4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=a5b8abe945258da725d236a47dbe74d2 XMM02=412cbea97a5e2dc4a251c05f42a0e8c1 XMM03=4dad749edc3a902ee796d06231004938 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=0d0c0f0e09080b0a0504070601000302 XMM07=0e0d0c0f0a09080b0605040702010003 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000