6, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:35:41 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x80040000) [ 2052.769065] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:35:56 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5c}, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x1e9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001180)={'syztnl1\x00', &(0x7f0000001500)={'syztnl2\x00', 0x0, 0x2f, 0x20, 0x20, 0x25b67807, 0x2c6509725ac2013, @private2, @loopback, 0x1, 0x80, 0xd20, 0x9}}) [ 2067.955594] kauditd_printk_skb: 44 callbacks suppressed [ 2067.955610] audit: type=1326 audit(1705350956.261:556): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2067.960010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2067.969750] audit: type=1326 audit(1705350956.261:557): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2067.992123] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2067.997184] audit: type=1326 audit(1705350956.264:558): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2068.020173] audit: type=1326 audit(1705350956.264:559): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 sendmmsg$inet6(r0, &(0x7f0000003000)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x1c, &(0x7f00000004c0)=[{&(0x7f00000001c0)="367af956d728e7c2ffeacdde34f28c41df0753fd861604bde49fb6b3793bd2", 0x1f}, {&(0x7f0000000340)="4fd14f44f9fc28abc21556b8d221a8f8a0d0f7e3732eadf5f3c7f4cd4aece6d0674275acda0c4d668816adc2f9783914f8f0d8a9fa957e1b60638dc9d44bb39765e9cff14957e3efa29a84746ee220efa40cf6799e550eb546d800d7efa69ab782c44c996a5b48bfcee0b4e667b8ccd6a22ed5e5324a188653430960b271a6a19f6b44c3bf07e8fde46fd447c4109ee817c9c3324a9a131911581cf12815df7370899f11", 0xa4}, {&(0x7f0000000400)="fb72fd0cd7ede495d7414e674546a4032428d251878f523ea38288ac13f8942e9f484d4a142e32a6e3198b96b333218560492ca0b36ddbbd32881e439d22f571bf43bd911f1cb217ab1f417ded0a914cdf0846475010739ee1e3f60c60302f6d10d2bb78", 0x64}, {&(0x7f0000000480)="a7584cb6f113410d09de601da3f0db0544a9fe711500368d31d7", 0x1a}], 0x4, &(0x7f0000000500)=[@dontfrag={{0x14, 0x29, 0x3e, 0x400}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @dstopts={{0x88, 0x29, 0x37, {0x11, 0xd, '\x00', [@calipso={0x7, 0x58, {0x3, 0x14, 0x5, 0xff, [0x1000, 0x6, 0x1288, 0x8, 0x101, 0x3, 0x7, 0x0, 0x66d9, 0x4f]}}, @hao={0xc9, 0x10, @private2}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x4}}, @hopopts_2292={{0xe8, 0x29, 0x36, {0x33, 0x19, '\x00', [@enc_lim={0x4, 0x1, 0x20}, @calipso={0x7, 0x28, {0x3, 0x8, 0xfe, 0x3, [0x10001, 0x2, 0x401, 0xc7ce]}}, @calipso={0x7, 0x18, {0x0, 0x4, 0x1, 0x5, [0x8, 0xa8]}}, @calipso={0x7, 0x8, {0x3, 0x0, 0x0, 0x1}}, @ra={0x5, 0x2, 0x2}, @generic={0xff, 0x1e, "5207a4bc596987b303994fefe9f1ea984f3ea26621953941a142105fda4e"}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x20, {0x1, 0x6, 0x1, 0x7fff, [0xfffffffffffffff8, 0x5, 0xfffffffffffffffd]}}, @calipso={0x7, 0x28, {0x3, 0x8, 0x8, 0x8, [0x8, 0x0, 0x1, 0x7]}}]}}}, @dstopts={{0x88, 0x29, 0x37, {0x2f, 0xe, '\x00', [@generic={0x2, 0x1f, "cf97dc362e11d7a47ffe3184e285ca6383a468339721581dce6a7fd3007604"}, @pad1, @calipso={0x7, 0x30, {0x0, 0xa, 0x5, 0x553, [0x7, 0xffffffffffffffff, 0x0, 0x6, 0x3]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @mcast2}, @ra={0x5, 0x2, 0x9}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xe96}}], 0x270}}, {{&(0x7f0000000780)={0xa, 0x4e20, 0x6, @mcast2, 0x101}, 0x1c, &(0x7f0000000a00)=[{&(0x7f0000003600)="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", 0x1000}, {&(0x7f00000007c0)="9281e441", 0x4}, {&(0x7f0000000800)="65b57463ae3d1518da67211aaf", 0xd}, {&(0x7f0000000840)="aa351749b87fbc77409f8042296c694fd407cc34582904a5f7a9234d172badb36395769c541e39104ef305207ca2049e30a94e593d6d126c165230e5ca5c76c9135eb9936121c42f33f923090738d51d0c26e64474c54534ea83329ecb77", 0x5e}, {&(0x7f00000008c0)="33787d1af83697cd5ab0db1fff7cf19bb6c61110a4a2b461035ee6dea62be84e892cd24f6b75a75a82be7d90e6943aed2dc8e65fc1e73612b8ad7cd8bad9377990058fe3baea5e9d43b41eb0832048f30b3603efb0884b343eb112a96b400d304fe88119491d479136736a9da4989b6d72c0f93cc6621133fd15", 0x7a}, {&(0x7f0000000940)="0bcfb3ac3cc04b0124d1e47911fcf9f9001eb18fabed5970e2f9aaa2d1ec2216ef082c7697af4b1860e412012cf48bf1dcf320c2d1cb4be647dc50269a4731f0bd5cf02179ff38f16a9cee97dbef413368065be5086d67c8904b0387c0d122a396dd9e299c04a824bfc3a8dbfdced61674f1318d8246048d1222389f9d034f248b12d45e6d04d665d99714e127fc152b7417695de8ae", 0x96}], 0x6}}, {{&(0x7f0000000a80)={0xa, 0x4e20, 0x8, @mcast2, 0xfffffffe}, 0x1c, &(0x7f0000000b00)=[{&(0x7f0000000ac0)}], 0x1, &(0x7f0000000b40)=[@dstopts={{0x20, 0x29, 0x37, {0x11, 0x0, '\x00', [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @hopopts={{0x198, 0x29, 0x36, {0x8d, 0x2f, '\x00', [@ra={0x5, 0x2, 0x2}, @generic={0x3f, 0xc4, "d7d79897aab4037331486110a9f07791522cb754126cdb370044279e57c5fd46659e687a8189aa6efc2cf8acb34a8899ada90ab568b07a6f2254fc2fdd079873afe9ab20eeabc93498560aa08d29d2c69943fdf955446c8e4a83131c15d51e7688cc9dc5c2c5d5055a7032d30e26441670b4633a6e4c02fdfe34073a24ead195de856c02a5a4b0fb93138c4a42be3c9a2ac9f5ac6f56751e2749d63bc5c00552c2b9e2c66fb8736019a193c52dda0ad040372e3e28c3ded7acdff93dcc90bdcc6bf6890e"}, @calipso={0x7, 0x40, {0x2, 0xe, 0x9, 0x0, [0x5, 0x40000000000, 0x4, 0x1ff, 0x1, 0x3, 0x4]}}, @generic={0x0, 0x68, "b30b01631c681c29ecfffb3603b2535e0885174a6e2a2cc835be763dd69c52fc5e1bb17b1e98d11311a9483ba7a7c964c82a865f3ffc10ff131a41345bc024fe02bbdc669da826dd62c7bb3888f96e7a5958ecdf6553ccb160fc548c2eb9f98480d824eaaa7064fc"}, @jumbo={0xc2, 0x4, 0x1000}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xfffffffb}}, @hopopts={{0x70, 0x29, 0x36, {0x84, 0xa, '\x00', [@calipso={0x7, 0x50, {0x2, 0x12, 0x3, 0x8, [0x5, 0x1, 0x10000, 0x4, 0x4, 0x7, 0x6f, 0x4, 0x5]}}]}}}], 0x258}}, {{&(0x7f0000000dc0)={0xa, 0x4e23, 0x3, @rand_addr=' \x01\x00', 0x8}, 0x1c, &(0x7f0000001440)=[{&(0x7f0000000e00)="7190ca39bdb54d61065ddcc1542bc7acb1b39995927a65d80fb59c169afd8c7e8b4b5e367cb9054577594ff7989c0fa31e48814fc665d4802c0c6103cc404b755690789640516162aee1945885bb67b6536e37c32a0c914c19f31bb7ef73b0b5b219afa200848582404024801b069643", 0x70}, {&(0x7f0000000e80)="912fb736af425fd519d15fb84f819e90fbb2e56da2adb56de44ab9994e7cf0303be182fe2461ab2a2ba44af8a60990a1eb42e5918214613cc390b461c0077a25e01e27a8d415e0be4bf0dc183d00063b92b5aa42e4c75dcca5d29a37190daede8d0889d9fe6844799365e3d05f3ae1c945337ccc50013569", 0x78}, {&(0x7f0000004600)="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", 0x1000}, {&(0x7f0000000f00)="c62bc902a1330fa287d74c6fefe3a8e71c3153cdb0bc9cbe3137160c9953b71c65c2ba7392a08f36ffe53ff98b52f3f6536f9c98045d9307f4dd3552d63bed08b238a9c629ceb436a6286a4a674d504bb1ce9fb732258ad693a75aa1bbf70df5f39346d05f1b1a3d497e444edf02199d18d0200f9d39905d7697f9820d604f167fefc1c86a278536888feee9d65f3da704d8e8052c395957c6c777ded43bbcf20cb1144031f4962486203442944dfd987c5c76688b9d7bbb6802d3caaaa43bec7bdadb4b57a06a156b3289fce613e4d801451975114bbdc428", 0xd9}, {&(0x7f0000001000)="16", 0x1}, {&(0x7f0000001040)="d81dfd6ba70b55b1fa7820564c2e04a21e49cc596fe8", 0x16}, {&(0x7f0000001080)="ca55912bc6806e9731e8f26b9b3589b296bbf061cf5da097dda52f59cf5bcea11c774c2c26d1dd8d848a36258e82a4354be8a69c48c3e80578d7979a53ee9e22a9ef40c143958e60d2fc4060eb562a7c0279b25a909c3a854edd41cc892475e31a87b7602047e5971fc034ba09acaa3e5ab097045d69b86e12e78e7c84d0c2bd1db319df2149c01f2311f2", 0x8b}, {&(0x7f0000001140)="a891c70815b2dcf2fdc0c222d3770da0d5b44a5dcf2fa6", 0x17}, {&(0x7f0000001240)="77f326610959caebd0834d9f5d07f13b3233b371f8c187f739e6c6fa5dd35fe784dfa68884186e285cbe867519fcd7d20ce48f29d2e12d13a58c6efd7abf36f37572c52047a5e774ae2003409679b429709e6ce9a2923b35d22503c2cdc25b40f95512d856bda8d4c37f870e5fc65a07806da5fcb6c11602770b23439b522cfd198806b4135bc59cbe196f1e1a0e49bf745b8c37a09ab9839c7133313f9fa5f873586c9692308d26ff08ebf80ee547951fa582a7e6bb4aa8a54c38405c6a63654e507e75dc2bab4d2f8a769a08076317ebed70f057c7dee155664aeb", 0xdc}, {&(0x7f0000001340)="7b2986792f0cbbcfa7fd163e6bd3179c2fbcbc154fa9d80c85c71ade509fe5a53669884ba22c4446fe1f95c41c80f20d477b2e254cebdfed7245723f45ac53fa84820392cf8b360a053b87c5c814faeb2f08937ddf19e18f0522decce7c42f7bc794d44fb6ae0869bd018f63ce3b21c30edb7a9eff7a9e6cafec8df53efc8986653db0cf6180c7185c6a15b950bf663fb7b661e0af541225aba88d2a2b4a4b4134e3ccc54566cc2c498b74f13727745472168f995271d7838a07bf308f8230e667bcdf03988d529531a4f3bd6235", 0xce}], 0xa, &(0x7f0000001580)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x10001}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @hopopts={{0xb8, 0x29, 0x36, {0x2c, 0x13, '\x00', [@calipso={0x7, 0x40, {0x1, 0xe, 0x7, 0x1, [0x2, 0x5, 0xce, 0x8000, 0xe3f, 0x6, 0x6]}}, @calipso={0x7, 0x28, {0x2, 0x8, 0x5, 0xbe99, [0x9, 0x81, 0x81, 0x400]}}, @ra={0x5, 0x2, 0x101}, @enc_lim={0x4, 0x1, 0x3}, @ra={0x5, 0x2, 0xfff8}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x5}, @calipso={0x7, 0x18, {0x1, 0x4, 0x81, 0x9, [0x4, 0xfffffffffffff203]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local, r3}}}], 0x110}}, {{&(0x7f00000016c0)={0xa, 0x4e24, 0x5, @empty, 0x68}, 0x1c, &(0x7f0000001880)=[{&(0x7f0000001700)="57a7b58a259121b744d7a61e12099d7fd8039f9277d384fce6230ec7def272e4ec87d9495acafb1bc81132bca996478be2349ad1acb5a509432e59b39a2c7f999bfe2d4132539cf29fbf57b4feabd1dd818235e66748f79715aea302bcf07cfa5b37bad1d94f40b9", 0x68}, {&(0x7f0000001780)="320073ef56ebfc71feecc77c751978a041f7d77872ad6dc833157de0eb94e540", 0x20}, {&(0x7f00000017c0)="f5f13ef7c13afeae04d6cb564a532604473a70ed87318e7ff859c7350a78a19d83dc49dfed3ffc37fc796a274fc88645b7d0b0727fd9a6407247bc2bc0adfd2d0cfad907f92311104e5657143d044757c85d603615c873a4e9b2226829a4a09151e06138c8ac8cba6c444483db2a80", 0x6f}, {&(0x7f0000001840)="bfa049fc4f8f9c9707d48a496c4224f27d11f875f16448d8192486fa3038b4450d022fe9deb90868c9ab6974930b3bfe58debe00bdaf3c11", 0x38}, {&(0x7f0000005600)="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", 0x1000}], 0x5}}, {{&(0x7f0000001900)={0xa, 0x4e21, 0x4, @dev={0xfe, 0x80, '\x00', 0x38}, 0x4}, 0x1c, &(0x7f0000001c80)=[{&(0x7f0000001940)="97064c691a5aaf22df90031f1a58edb5ea9a36ab73ae00e9650e1e08ffcd239981af7f5b9b6ac41dc05012e5a5a5f0fb54d4ba0a094650befda7cad4966cd6b566f9fce31f1bb4c5409f757df241ef3c91012f583f30ecc99cf4466854b9cd5b37eebac2b7737d93d20e5e0d9f791d458872e22323fcc58961ea098921", 0x7d}, {&(0x7f00000019c0)="30e92c412ecb1eeef4d35651adba93ad024e3c9b16df71ba746e1c687aa12a245cb0329a065a822a44366d745192e513c6b16befb487af0c1ee07a25e856769077e967c2533964fb177f4c9386f587c516989e80d44ac0ae343cd074607e1858d39a509352240dbddf32be4bd45aec94effb32b6e8a44fdeae3e4e4179cff97d584cd9e46e909426b7378ef95a073b90f1324c2eaff15bd250f66534b7f48e95ce3e9419ec2de95660654352705a8161924ae4233ed9d549234e86fcc7757db662cdeb3d8a1a2fd05812476c1d12ceadba910a894117d2c5200bda2b8f6c48632d", 0xe1}, {&(0x7f0000001ac0)="cbe5231e568ee97005d6c7d605e62c7aefcba7ee2008b095e3acf30306503173f0c075882dcfea22bf9bed90a00693d19f9f6f7e0f840f1912304b011ac33bfd3759cdc91a82691eda5420efb5e753ac573cfc115d1151ba14fbfd2d93f74de65a", 0x61}, {&(0x7f0000001b40)="5c7f1e373172187d6eea96d5a54151de8b34df4c3a358a5a8dbd36a7050cfa6dd3c58106187f932efed294aa84489884058f744e676078a8539e5db832b20e245d9c7d2fad58ce74b25e6cebc5500f6129466741815362cce91af3b44bd4d9d8f6f76f736c29fe3f31afc49955a5aca2cf8dba4632b83749f2ea37fe0581c07804925d5f7da89ba979155122a18e6e59c5f6a6e016839066b307fa25e3f039b155232bf4837c2132fe63b85510cccf892d7597e83e296f48868542c8e5b4e9673f32ed563bd4a847d7c05a3aba407e7230f8a4808e9650548a9ceab3ec5365af1d8402025a026ddc024a1b7a2d24226abd61ebbed7a7b058de", 0xf9}, {&(0x7f0000001c40)="1fd4cfce1fbb1ef03332", 0xa}], 0x5, &(0x7f0000002e00)=[@hopopts={{0x20, 0x29, 0x36, {0x2b, 0x0, '\x00', [@ra={0x5, 0x2, 0x5}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x2}}, @hoplimit={{0x14, 0x29, 0x34, 0x80000001}}, @dstopts={{0x100, 0x29, 0x37, {0x4, 0x1c, '\x00', [@generic={0x7f, 0xdc, "f02efca742a4efde316c9a050673ddba7204c6e14d743e5abe8d1140e2bf2c05d8c2668624e8455d1a21c0242a4c26e175d9ee3709197864879ac7ff0b820d14c76cd0f18581d2d9814217bd63638cd48ed88fa01f4d264425a01fa3545f6fb753d3d72e7625f4f552f9c0b235b4269154f001e852138199ff35aa173fc28aa8ba58e3e91211ef71937ca483f92230ef70c70743c08a01926aa981a1bbfe0db6c52eb4ccb88a0a14c2fde554e910d7857764c1935c430be594262bcbbe1885baf7b0916fa3659ae9e4abe660514379f8a7d1f1949e7eb53e0ae99ad6"}, @enc_lim={0x4, 0x1, 0x3}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1f}}, @dstopts_2292={{0x30, 0x29, 0x4, {0xaaee300b52898d11, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast1}]}}}, @hoplimit_2292={{0x14}}, @hoplimit={{0x14, 0x29, 0x34, 0x63}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}, @hoplimit={{0x14, 0x29, 0x34, 0xe4}}], 0x1f8}}], 0x6, 0x40040c0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffc, 0x0, 0x0, @buffer={0x0, 0x1000, &(0x7f0000001e00)=""/4096}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7fffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105142, 0x1) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="00762f1b", @ANYRES16, @ANYBLOB="01000000000000", @ANYRES32, @ANYBLOB="0400"], 0x20}}, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x8, 0x0) r5 = getpgrp(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0x101}}, './file0\x00'}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r6, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="00080000d8a55cc21319a9bf90c04dfc", @ANYRES16=0x0, @ANYBLOB="00022abd7000fcdbdf256200000008000300", @ANYBLOB="0600b40044110000"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x804) dup2(r1, 0xffffffffffffffff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0x4, 0xde, 0x0, 0x1, 0x7fff, r5}) 20:35:56 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x81020000) 20:35:56 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) 20:35:56 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, 0x0, 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:35:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x118, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:35:56 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00607e636c2c000b4c0aac1f802b3d51a24b8f9eaeb8a904b8baf58a684e42dab4813263ffd51984d70d3b09283c807a575b6763d0a5df60909cc68452f8effb0772b50db105812e24670402e7c24828593b4b768725e04395b180e2e6b48fb864f03e0a89961cf3a70282d3663cf875c739734c0d68d5aeae4a5dbc39cd04413530ae80eb792840d745833fb9b4bb6219c37b10f5981254d899f1afd9ed4ad4366f2554a70e373310387554cab3a7ce2e6dd1ae6cc3e9f9d4734f71a8c74b2729e1640280413d3ab12f22d82b5d349667b93ae39c28dd2c8c24be7dd2a61014227086f8d7e14b761c2c04084048d1c69398b04351c07eb716432c0473c6861b7eba8634f4e20603ec9d26cddcc1752576eb19d3ff98ab160c2f2a476aff2983eaa9ab706016da8f96"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:35:56 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:35:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x2, 0x5, 0x6, 0x0, 0x1}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f8", 0x16}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000011300)=ANY=[]) [ 2068.060086] audit: type=1326 audit(1705350956.272:560): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2068.092400] audit: type=1326 audit(1705350956.274:561): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:35:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@ipv4={""/10, ""/2, @initdev}, @in6=@private2}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0x17) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001e00)=ANY=[@ANYBLOB="3013001d130001000000000005bec9ebb6a4cb193db5b93e00000000000001000000000000000000000000707fae920d6aa687060000000a0f623c00000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0900000000000000ff010000000000000500000000000000f7ffffffffffffff2f0000000000000008000000000000000700000000000000810000000000000002000000000000000900"/84], 0x1330}}, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="10000000140001"], 0x14}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x4, 0xf8, 0x80, 0x7, 0x0, 0x3, 0x28090, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000380), 0xa}, 0x200, 0x0, 0x101, 0x0, 0x0, 0x1257, 0x6, 0x0, 0x8, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x1) readlink(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=""/104, 0x68) ioprio_set$uid(0x0, 0x0, 0x4004) accept$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x0, @remote}, &(0x7f0000000340)=0x10) syz_open_dev$mouse(&(0x7f00000002c0), 0x100, 0x670080) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) execveat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000780)=[&(0x7f0000000400)='veth1_to_bridge\x00', 0x0, &(0x7f0000000480)=':{-(\x00', &(0x7f00000004c0)='/\x00'], &(0x7f0000000680)=[&(0x7f0000000540)='/dev/input/mouse#\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x11\x00', &(0x7f0000000640)='/dev/input/mouse#\x00'], 0x800) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_LINK_TIMEOUT={0xf, 0x5, 0x0, 0x0, 0x0, &(0x7f0000000240)={r1, r2+60000000}, 0x1, 0x0, 0x1}, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/cpuidle', 0x1211c0, 0x181) 20:35:56 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x8cffffff) [ 2068.115242] audit: type=1326 audit(1705350956.276:562): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2068.118996] audit: type=1326 audit(1705350956.278:563): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2068.148940] audit: type=1326 audit(1705350956.280:564): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2068.175034] audit: type=1326 audit(1705350956.283:565): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14481 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2068.241383] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:35:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x118, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:35:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) lseek(r1, 0x0, 0x4) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x4004662b, 0x0) clock_gettime(0x0, &(0x7f0000000140)) timerfd_settime(r2, 0x0, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(r2, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) fstatfs(r1, &(0x7f0000000000)=""/46) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="01000002a8f68ad8bb000100", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653100"]) r4 = open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x9101) sendfile(r1, r3, 0x0, 0x100000001) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000080)=ANY=[@ANYBLOB="0100005c61f4e135e049ba8a", @ANYRES32=r4, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00./file0\x00']) 20:35:56 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x1, 0x1, 0x101, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c000000020901020000000000000070a70000090c0004800800018ed4fd8bfbc07a6f40000000060c000480080001400000001fb4a413ff034c5a1ca9ef7300304e5e9f7db250da728e22cbb4fed5d97617036e442b814fab3fe519ba8225a85c571cea25f72ca7665c5e5b0b5c269bb0bd1956689439875659223f939d41cab289ee5471b4ce0d496f490241a542c1bcf99c73a92d15a6126c6b39a945429e728e188ed1e211ee0c2ff807d94ce4bc4c7eb1fd96c44b75bb05e52de66b38c260200058202aeecd9f35ab42eb24e09331c8b04929e6"], 0x2c}, 0x1, 0x0, 0x0, 0x200008c1}, 0x204c024) 20:35:56 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xa1ffffff) [ 2068.426576] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2068.568530] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:35:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x230, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x118, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:35:57 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xf4ffffff) 20:35:57 executing program 6: syz_open_dev$sg(&(0x7f0000000080), 0x8, 0x100) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000030c0)='net/udp6\x00') preadv(r0, &(0x7f0000002400)=[{&(0x7f0000000140)=""/203, 0xcb}], 0x1, 0x0, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x5, 0xffffffffffffff80) [ 2068.726962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:35:57 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2068.895911] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:15 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) 20:36:15 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xf6ffffff) 20:36:15 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2200, 0x145) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000080)={[0x1]}, 0x8, 0x800) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x20, 0x8, 0x0, 0x0, 0x1000, 0x44, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0xf91764f6b537894f, 0x5, 0x7fffffff, 0x7, 0x5, 0xe1a1, 0x0, 0x0, 0x380, 0x0, 0x8}, 0xffffffffffffffff, 0x5, r0, 0x1) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) 20:36:15 executing program 6: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x44815, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x0) pkey_alloc(0x0, 0x3) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x6ca102, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f0000ff4000/0x2000)=nil) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) munlock(&(0x7f0000ff5000/0x1000)=nil, 0x1000) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ff7000/0x2000)=nil) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x5) 20:36:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x230, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x118, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:36:15 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:36:15 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:36:15 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2086.816185] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2086.821036] kauditd_printk_skb: 23 callbacks suppressed [ 2086.821053] audit: type=1326 audit(1705350975.127:589): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2086.831294] audit: type=1326 audit(1705350975.137:590): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2086.854503] audit: type=1326 audit(1705350975.154:591): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2086.887370] audit: type=1326 audit(1705350975.156:592): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2086.913641] audit: type=1326 audit(1705350975.157:593): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2086.934400] audit: type=1326 audit(1705350975.157:594): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2086.946632] audit: type=1326 audit(1705350975.170:595): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2086.952467] audit: type=1326 audit(1705350975.170:596): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:36:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x800) inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x2000003) r1 = syz_io_uring_setup(0x3ac4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r4}, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x280) close(r4) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x4010, r4, 0x0) syz_io_uring_submit(r5, r3, &(0x7f00000000c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x0) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) syz_io_uring_submit(r6, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, 0x0) inotify_init1(0xc00) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)=""/69, 0x45}], 0x1) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2086.958189] audit: type=1326 audit(1705350975.178:597): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2086.964906] audit: type=1326 audit(1705350975.178:598): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2087.119065] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:15 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfbffffff) 20:36:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f0000000300)='./file1\x00', 0x185802, 0x0) creat(&(0x7f0000000280)='./file0/file0/file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001380)={0x0, ""/256, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) r4 = openat(0xffffffffffffffff, 0x0, 0x404100, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) openat(0xffffffffffffffff, 0x0, 0x0, 0x120) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0xfef) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/54) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000015c0)) sendfile(r0, r1, 0x0, 0x20d315) r5 = dup(r4) write$P9_RREADLINK(r5, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRES32, @ANYBLOB="d3dd1288305c40194e16ae40c64a3562d9a50cb05c6d6dd72aba1572001c5977b280a9ec3515defabe83", @ANYRESDEC=r3], 0x1c) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000140)) [ 2087.392304] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x800000007, 0xe, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4006) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x10000, &(0x7f0000ff8000/0x2000)=nil, 0x5) 20:36:15 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:36:15 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfeffffff) [ 2087.661714] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x1f, 0x0, 0x0, 0x5, "f31afa00434ef9bab774bdca0d00", 0x20}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xa0, 0x40, 0x9, 0x80, 0x0, 0x100, 0x40000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x401, 0x401}, 0x4400, 0x8, 0xffff, 0x0, 0x100000001, 0x64, 0x3c1c, 0x0, 0xa27, 0x0, 0x7fffffff}, 0x0, 0x8, r3, 0x2) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f00000005c0)={0x0, 0x1, 0x1a, 0x13, 0x9, &(0x7f00000001c0)="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"}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000600)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @broadcast}, 0x78ba83875873090d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7fffffff, 0x6}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@mcast1, 0x32}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000680)={0x0, r4, 0xfd, 0x8, 0x100000000, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x840080, 0x64) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 20:36:16 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x28, r6, 0x401, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x28}}, 0x0) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), r0) r10 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000540)={0x320880, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240)=0x0, {0x8}, &(0x7f0000000280)=""/244, 0xf4, &(0x7f0000000380)=""/239, &(0x7f0000000500)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) perf_event_open(0x0, r11, 0x3, r10, 0x9) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000300)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r9, 0x1, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r11}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r12}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000010) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_TX_POWER(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x28, r4, 0x401, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r13}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x28}}, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00@\x00', @ANYRES16=r1, @ANYBLOB="00022abd7000fbdbdf250a000000060009000100000008000300", @ANYRES32=0x0, @ANYBLOB="0c000600020000000000000008000300", @ANYRES32=r13, @ANYBLOB], 0x38}, 0x1, 0x0, 0x0, 0x89}, 0x0) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="110000000000000000000100000000000a0004007770616e330000000800050000000000000000f7ff00"], 0x30}}, 0x0) [ 2087.878072] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.6'. 20:36:32 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2103.720255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2103.744208] kauditd_printk_skb: 25 callbacks suppressed [ 2103.744224] audit: type=1326 audit(1705350992.049:624): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2103.751130] audit: type=1326 audit(1705350992.056:625): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2103.764467] audit: type=1326 audit(1705350992.056:626): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2103.776229] audit: type=1326 audit(1705350992.057:627): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:36:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xff000000) 20:36:32 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:36:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x230, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x118, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:36:32 executing program 1: r0 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x583442, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) sendfile(r1, r2, &(0x7f0000000040)=0x7fff, 0xc49d000000000) r3 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) fsmount(r0, 0x1, 0x72) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) fsmount(r3, 0x0, 0x0) 20:36:32 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x5, 0x0, 0x0, 0xc2, 0xf, "00080013000600000000b4d2b4d100"}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') preadv(r1, &(0x7f0000001180)=[{&(0x7f0000000040)=""/5, 0x5}, {&(0x7f0000000080)=""/151, 0x97}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x3, 0x2, 0x25e) pread64(r1, &(0x7f00000011c0)=""/198, 0xc6, 0x20) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1ec, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r7, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r6, &(0x7f00000012c0)=@IORING_OP_CLOSE={0x13, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r8}}, 0x5) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r9, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r9, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r9, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r9, 0xffffffffffffffff, 0x0, 0x9bbb) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) 20:36:32 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) 20:36:32 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2103.789242] audit: type=1326 audit(1705350992.063:628): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2103.804068] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2103.805768] audit: type=1326 audit(1705350992.069:629): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2103.805863] audit: type=1326 audit(1705350992.075:630): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2103.868199] audit: type=1326 audit(1705350992.089:631): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:36:32 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x3bac, &(0x7f0000000040), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) accept(r3, 0x0, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2103.899979] audit: type=1326 audit(1705350992.090:632): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:36:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xff010000) [ 2103.945479] audit: type=1326 audit(1705350992.100:633): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15010 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:36:32 executing program 6: r0 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000140)={'veth1\x00', {0x2, 0x0, @remote}}) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0xc, 0x0, "4cbb66a69173a58703d1e4de362afd07995d596291d9d6498afd5f9817cbb28d3a3e80871f8a9c367a4cf7d9709ff7f2b307770f53c86ed53d0dfff007e16ac8", "57d91397e4ffec9f5b2c108c0016a4a78e0dd0e285657924e5edafc67698b188"}) [ 2104.123273] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:32 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r0, 0x323, 0x80000}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) r4 = openat2(r1, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)={0x50800, 0xd4, 0x6}, 0x18) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0xff, 0xf6, 0x2, 0x0, 0x0, 0x40, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe3, 0x1, @perf_config_ext={0x4, 0x3}, 0x40080, 0x40, 0x3ff, 0x0, 0x80000000, 0x9, 0x6, 0x0, 0x2, 0x0, 0x77a}, r3, 0x1, r4, 0x9) sendfile(r1, r2, 0x0, 0x100000001) 20:36:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xff0f0000) [ 2104.507069] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x234, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x11c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:36:32 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffbffff) [ 2104.739992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2104.866359] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:33 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00607e636c2c000b4c0aac1f802b3d51a24b8f9eaeb8a904b8baf58a684e42dab4813263ffd51984d70d3b09283c807a575b6763d0a5df60909cc68452f8effb0772b50db105812e24670402e7c24828593b4b768725e04395b180e2e6b48fb864f03e0a89961cf3a70282d3663cf875c739734c0d68d5aeae4a5dbc39cd04413530ae80eb792840d745833fb9b4bb6219c37b10f5981254d899f1afd9ed4ad4366f2554a70e373310387554cab3a7ce2e6dd1ae6cc3e9f9d4734f71a8c74b2729e1640280413d3ab12f22d82b5d349667b93ae39c28dd2c8c24be7dd2a61014227086f8d7e14b761c2c04084048d1c69398b04351c07eb716432c0473c6861b7eba8634f4e20603ec9d26cddcc1752576eb19d3ff98ab160c2f2a476aff2983eaa9ab706016da8f96"]) r3 = fork() getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:36:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffff000) 20:36:50 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:36:50 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:36:50 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x80000001) 20:36:50 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/sem\x00', 0x0, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}], 0x1}, 0x0) syz_io_uring_setup(0x3bac, &(0x7f0000000040), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff}) accept(r3, 0x0, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 20:36:50 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r0, 0x323, 0x80000}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = getpgid(0xffffffffffffffff) r4 = openat2(r1, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)={0x50800, 0xd4, 0x6}, 0x18) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0xff, 0xf6, 0x2, 0x0, 0x0, 0x40, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe3, 0x1, @perf_config_ext={0x4, 0x3}, 0x40080, 0x40, 0x3ff, 0x0, 0x80000000, 0x9, 0x6, 0x0, 0x2, 0x0, 0x77a}, r3, 0x1, r4, 0x9) sendfile(r1, r2, 0x0, 0x100000001) 20:36:50 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00607e636c2c000b4c0aac1f802b3d51a24b8f9eaeb8a904b8baf58a684e42dab4813263ffd51984d70d3b09283c807a575b6763d0a5df60909cc68452f8effb0772b50db105812e24670402e7c24828593b4b768725e04395b180e2e6b48fb864f03e0a89961cf3a70282d3663cf875c739734c0d68d5aeae4a5dbc39cd04413530ae80eb792840d745833fb9b4bb6219c37b10f5981254d899f1afd9ed4ad4366f2554a70e373310387554cab3a7ce2e6dd1ae6cc3e9f9d4734f71a8c74b2729e1640280413d3ab12f22d82b5d349667b93ae39c28dd2c8c24be7dd2a61014227086f8d7e14b761c2c04084048d1c69398b04351c07eb716432c0473c6861b7eba8634f4e20603ec9d26cddcc1752576eb19d3ff98ab160c2f2a476aff2983eaa9ab706016da8f96"]) r3 = fork() getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:36:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x234, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x11c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2121.944411] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2121.959423] kauditd_printk_skb: 24 callbacks suppressed [ 2121.959439] audit: type=1326 audit(1705351010.265:658): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2121.967563] audit: type=1326 audit(1705351010.271:659): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2121.993910] audit: type=1326 audit(1705351010.272:660): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2121.996699] audit: type=1326 audit(1705351010.272:661): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2122.022486] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2122.065765] audit: type=1326 audit(1705351010.272:662): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2122.115306] audit: type=1326 audit(1705351010.273:663): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2122.125933] audit: type=1326 audit(1705351010.273:664): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2122.143020] audit: type=1326 audit(1705351010.286:665): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2122.181059] audit: type=1326 audit(1705351010.286:666): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2122.189828] audit: type=1326 audit(1705351010.287:667): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15282 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:36:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffffbff) 20:36:50 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2122.362340] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xffffff7f) [ 2122.561538] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:50 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='stack\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001940)=[{&(0x7f0000000480)=""/78, 0x4e}], 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_names\x00') unshare(0x48020200) r2 = open(0x0, 0x301002, 0x80) r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0xa01d, 0x20, 0x0, 0x342}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), 0x0) r4 = open(0x0, 0x301002, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x6, 0x64210, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x800, 0x0, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x1000, 0x0, 0x8}, 0xffffffffffffffff, 0x1, r4, 0x0) r5 = fsmount(r0, 0x1, 0x0) dup2(r5, r3) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) 20:36:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xffffff8c) 20:36:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x234, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x11c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2122.806239] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:51 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2122.881262] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:36:51 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xffffffa1) [ 2123.108047] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:36:51 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='stack\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001940)=[{&(0x7f0000000480)=""/78, 0x4e}], 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_names\x00') unshare(0x48020200) r2 = open(0x0, 0x301002, 0x80) r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0xa01d, 0x20, 0x0, 0x342}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), 0x0) r4 = open(0x0, 0x301002, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x6, 0x64210, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x800, 0x0, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x1000, 0x0, 0x8}, 0xffffffffffffffff, 0x1, r4, 0x0) r5 = fsmount(r0, 0x1, 0x0) dup2(r5, r3) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000100)) 20:36:51 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x80000001) 20:37:07 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:37:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x240, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x128, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0xf, 0x5, "376034fac72a20a544a923"}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:37:07 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000001b000100000000001700000002000000000001800da8c725"], 0x1c}}, 0x0) 20:37:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffffff4) 20:37:07 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x80000001) 20:37:07 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:37:07 executing program 6: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0xaa1, 0x3, &(0x7f0000001400)=[{&(0x7f0000000140)="eb3c906d6b66732e666174000208e1ff0370008400f8", 0x16}, {0x0, 0x0, 0x3}, {&(0x7f0000000080)="3a7701117ce20cf0e53e976ddb1dc242eecd516084ba4393ead49df70cc2ff38914748e4091e0b031b51cb3b0e489e134457c7b9e31f72fc151126e0", 0x3c, 0x400000080000001}], 0xc41, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) fallocate(r0, 0x10, 0x101, 0x8000) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x101) syz_io_uring_submit(r1, 0x0, &(0x7f00000013c0)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd_index, 0x5, 0x0, 0x8, 0x4}, 0x9) chroot(&(0x7f0000000280)='./file2\x00') r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', &(0x7f0000000200)=@shmem={0xc, 0x1, {0x0, 0x7ff}}, &(0x7f0000001480), 0x1400) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) openat$null(0xffffffffffffff9c, &(0x7f0000000340), 0x202700, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000003c0)={0x0, "a91f51fa5d7fcca1d4fb574218c55843"}) socket$nl_audit(0x10, 0x3, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) sendfile(r2, r3, 0x0, 0x100000001) 20:37:07 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2139.351401] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2139.359483] kauditd_printk_skb: 25 callbacks suppressed [ 2139.359494] audit: type=1326 audit(1705351027.665:693): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2139.363091] audit: type=1326 audit(1705351027.665:694): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2139.366743] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2139.370323] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2139.373459] audit: type=1326 audit(1705351027.669:695): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2139.382733] audit: type=1326 audit(1705351027.669:696): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2139.390957] audit: type=1326 audit(1705351027.669:697): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2139.412545] audit: type=1326 audit(1705351027.709:698): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2139.423260] audit: type=1326 audit(1705351027.710:699): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2139.438499] audit: type=1326 audit(1705351027.718:700): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15645 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=57 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:37:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffffff6) 20:37:07 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffffffb) 20:37:07 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000001b000100000000001700000002000000000001800da8c725"], 0x1c}}, 0x0) [ 2139.709935] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2139.784205] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:08 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000001b000100000000001700000002000000000001800da8c725"], 0x1c}}, 0x0) 20:37:08 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffffffe) [ 2139.898682] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 20:37:08 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2140.073730] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2140.078488] audit: type=1326 audit(1705351028.384:701): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15780 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2140.080962] audit: type=1326 audit(1705351028.384:702): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15780 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:37:25 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x4000000000000) 20:37:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x240, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x128, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0xf, 0x5, "376034fac72a20a544a923"}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:37:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x234, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x11c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x234}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:37:25 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) 20:37:25 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2156.991961] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2157.000324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2157.007038] kauditd_printk_skb: 17 callbacks suppressed [ 2157.007049] audit: type=1326 audit(1705351045.304:720): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2157.012320] audit: type=1326 audit(1705351045.304:721): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2157.016871] audit: type=1326 audit(1705351045.304:722): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2157.032611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2157.037747] audit: type=1326 audit(1705351045.305:723): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:37:25 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:37:25 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0000001b000100000000001700000002000000000001800da8c725"], 0x1c}}, 0x0) 20:37:25 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2157.063155] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2157.069350] audit: type=1326 audit(1705351045.305:724): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:37:25 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x8000000000000) [ 2157.094457] audit: type=1326 audit(1705351045.305:725): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2157.098862] audit: type=1326 audit(1705351045.314:726): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2157.103855] audit: type=1326 audit(1705351045.314:727): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2157.107770] audit: type=1326 audit(1705351045.314:728): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2157.112809] audit: type=1326 audit(1705351045.314:729): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15890 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2157.182153] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:25 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x10) 20:37:25 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x20000000000000) [ 2157.310510] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:25 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xf0ffffffffffff) 20:37:25 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:37:25 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) [ 2157.571296] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:41 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2172.796026] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2172.802415] kauditd_printk_skb: 25 callbacks suppressed [ 2172.802426] audit: type=1326 audit(1705351061.099:755): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2172.807173] audit: type=1326 audit(1705351061.108:756): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2172.812360] audit: type=1326 audit(1705351061.109:757): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2172.820981] audit: type=1326 audit(1705351061.109:758): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2172.828810] audit: type=1326 audit(1705351061.109:759): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2172.834442] audit: type=1326 audit(1705351061.109:760): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:37:41 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:37:41 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) getitimer(0x0, &(0x7f0000000080)) 20:37:41 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:37:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x240, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x128, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0xf, 0x5, "376034fac72a20a544a923"}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:37:41 executing program 6: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='uid_map\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x4840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x5, 0xfc, 0x9, 0x9, 0x0, 0x6, 0x40108, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xea, 0x2, @perf_bp={&(0x7f0000000100), 0x2}, 0x40000, 0xffffffffffffaecc, 0x1f, 0x1, 0x7a4, 0x0, 0x7, 0x0, 0x4b, 0x0, 0x1}, 0x0, 0x2, r0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) r3 = accept4$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f00000001c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0xbd, 0x3e, 0x6, 0x567, 0x5}) mmap(&(0x7f00002ea000/0x4000)=nil, 0x4000, 0x1000009, 0x13, r2, 0x0) 20:37:41 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) 20:37:41 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x100000000000000) 20:37:41 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) getitimer(0x0, &(0x7f0000000080)) [ 2172.845073] audit: type=1326 audit(1705351061.109:761): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2172.850183] audit: type=1326 audit(1705351061.109:762): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2172.856271] audit: type=1326 audit(1705351061.128:763): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2172.863891] audit: type=1326 audit(1705351061.128:764): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16136 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2172.874840] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:41 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x200000000000000) 20:37:41 executing program 6: r0 = epoll_create1(0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x90000019}) r2 = epoll_create(0x3ff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) syz_open_procfs(r3, &(0x7f0000000040)='net/xfrm_stat\x00') sendto(0xffffffffffffffff, &(0x7f0000000240)="1f4c736977e3000000000000006b7d72cbd2f9fc3a32f72da6adb47bc4e545916d5a1d95b0fba9dc9019059f25c4b0bd68ca1c2d1f9f2e91b61874cd734f88a174f81d496957cece8e0783f0ced44b82dc7e2c1c0099c7294383d3397b2dbc58f307c50019bb4c", 0x67, 0x20000085, &(0x7f00000002c0)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e23, 0x4}}, 0x80) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/62, 0x3e, 0x8000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)={0x20000001}) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x1080}], 0x1, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000180)={[0x401]}, 0x8) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f0000000340)={{0x0, 0x6, 0xa5f, 0x4, 0x8, 0x8, 0x80000001, 0x518, 0x5, 0xb957, 0x1, 0xfe48, 0x8, 0xda, 0xfffffffffffffff9}}) 20:37:41 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) getitimer(0x0, &(0x7f0000000080)) [ 2173.083995] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:41 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) 20:37:41 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x300000000000000) 20:37:41 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000003c0)=0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e20, @rand_addr=0x64010101}}, 0x0, 0x0, 0x47, 0x0, "61df683737e089651a697fa1d77eab321db70f0ce1d986591388ddf33d7e5fbc3098b0218808421cf1996402e7bafdae7f71162380ecaa2d3fbd853ac363dd78f7afae48a54f713b9edd7434dfda3f88"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)={0x298, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1000, @local, 0x8000}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x457b}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x51ed}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xe4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffff8001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x401}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NODE={0x160, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "3b30afe06fbaf21a0960c759291fc001a26000a0"}}, @TIPC_NLA_NODE_ID={0xb5, 0x3, "05552a77c358c0630f15264728cb7d5fe623c11ec3ea16e33662a8f3b7ac5d96bfef9a4d46702321be4a3a49444a493a9951962dec875d1e0911cf7f16843c31e99a1cbad504cdd7cb5471ed1a8fe5d01807aaf26c1134a0ff7d23ccd9c89353f86fbee16a04b71a981fe68c7178c0f9455ad8ad3c329c3815249aa8c6bb8df103b720aedc1bd44fe757a7c96871a744f770106be64b0c29411745ccc63df39ecdb0d9e5176965cad26f728555827d5547"}, @TIPC_NLA_NODE_ID={0x5d, 0x3, "848b46fda20a3d42885729ba834ced19b18eca678d3d894f28b8025b7476de3df9a191a9ad18a23157e1adbf14481d4a5d5e78c939e3fbb816057f0a41d4cd363c994b2322abc86fb1b23beefe7a97abc5921c748b69cf0420"}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xe9}]}]}, 0x298}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 20:37:41 executing program 6: r0 = fsopen(&(0x7f00000000c0)='rpc_pipefs\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='dirsync\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f0000001300)=0xeb43) r3 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) sendmsg$nl_generic(r5, &(0x7f00000012c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001280)={&(0x7f0000001340)={0xfffffffffffffde5, 0x37, 0x0, 0x70bd27, 0x25dfdbfd, {0x16}, [@generic="b0", @typed={0x8, 0x94, 0x0, 0x0, @pid}, @generic="0d9cf329834d353541357fc7bb870f806af8c788767f76b5c6321ffaa971379df6d2a2743c74dad3be72f0ef0140b439988be7e70685e4ddd8fc025a5e7b0d4b60d8fc8120be68a446921a458df67631a2b71a974e7daa49ae45dc33dd85012681712acdaf63a318f36dab97b97ad5191eb1599ddd50bac68e593934c0fe707b75faf65cacd6697d0992ac69c0b41216a1a4b883f5d3107daa8145477dafc947688bdbe3b35fd6b98fb8887bbb18af45a91eeb6a76ce7466320e7f54c479b231482da1c8b080d72316b43d3b7f3ff1c84e8ff610599b9568719da6f7dd9f3c616269988d9a0b6275d69fd349587c61e6fc4b3317cbd7e84f380b85fc559757617b31c91ba2f2ebd601dff113ef449d53f8b64a0cccb4a417e30049c8e506e56df83431aa832e957b34d173f4c8dfaed0e919f54e3cab258d0ead706a87ac0646550c1751b60ba57e3428d8bc3e4539449e73164e081819b7599eaf26c083c15b214712517c9668e4398fe01239cb9b640e03939548bbc8ece9236e49eaf2735c44ed64bcd0b5d38c51255ff5defc482231ce5037656af83b798c348cfdbaf4213d8046d7988092bc0b96eda627e5e60127f1f1f64c3200ad383aeaa532cb25901f2f78fff353c1b2e592cbafed749a3b3a8a4a92621483bede1362bdac966272b4f9bd35cddfd658cc4e159ea68be8e2b0d3a5376a0f40415015274fc08802e628a006759a2e52d520b0b4295f9f88dd38dc70a2aecf988ea8561323dc757ce87d43d3f202677567d8c274833a74f9dc80304bbfb7b25be185333896d22295fb62f5a78aad34ba768ebe14ef105a5ed0823326ba14d40a29fad139df60f0ad46e0929d9a9b3e4e5eecd9666baed0032b53e8cf88d0f24b2f17598a898471689236b177cf0a238e875fd9126f899e2b0be82cd46a41b592ab89537fbe71eb47a8fb2e5070f5ce0e3ecd93d2c28373eb96d95717955543c94101e7cacb2c280c687252bea059f04bf41be3d1a42008e4434278cc564fae1a500b1ec68bad5eef103630e7f669cc928d518a7d2371bfac03166c7db208de5c80d91196934e70d2506e8cb6589640c8cff9d991e3676fceab04130b7d430e9585e49f0578a312d1d10bdaa5202386f3af42e6919262cd3dca7873532c8d97cfe6057fb9512276d55b4619bde6cb19283280597c901334089147960d72619584f28214ba698668bbd9024c4fc9acffab0b08ece52823fe43a5fc2b9e6a4f4055315a35a14b72933efc60859353b6666e80008b4d5269324152ab2cffb47b30b09d34d043991c8fe58118ff7e8b76e733c7d46110bd03aa30e61c127c58890e8568dd7dba934644cf0ddeeba8942bbd2703d0e2fa0396c88d1a6b05e8075c22dd3517892dbc9694642931a6359d0b233a6b756b14a588f68121de86674c6061070b1986177ade66e1e9845d4415339b9a6817c7b8bd783471fa415f82038b97ee0109e47fc3ae8c00eddb7c13ffd105c07a17af4ff3ec3d4d0b5c556d0735a644d1c2a5a33e28c540f2c435a8210b63f09b351a1e60dd0a59862feb5028f50b5b7948a8a83d18151a31324d0ba7a1b46ba4a3363e1a090f46f4b572effd98458e54611b0fc19e9fe6c0e9cf1da1d1c4a82ef4cfb8dbbf6b70bf2cac444a061248f4b438211f75fe2da44753b6ade935a73f5b48bf54f37a6067b43eba926080102e990d4071aeb0f01178b9ac1796d768714243e96863497023f5ae73798776ec3e5c5a6b7e75ff5ac4cce3d5f32aeaa93c0e2af9b65ac2a04d55061176529ecec3bff4298591cf9e7c4f2ef75d1a6fa0d59fec489beecafdbb409bf29958fcdc9c50e192e4e6859de44d0000dcf4d68b09e4db889fcb92d04266a8d362adeb55cc99de3bfd52dc4d843c434cd6d4c733965b40c815fdd4c8565e41e8b10068e4c9adccae6cd0b05ac712e644e669bedb5452d98b0face6c11e453ecb4eb6373a5043a8afe12cdae151ce5b9313848bf4d03af2ad728fdc6a5e343dfcab39a1abadadad21db5295c7b7d8ea9210642e44c84d31c835537e90753b54c618436d28295316b246bdaf5462b4030866910b8b181a7f35636ff156ed3c1724fb57eb08c3a6e38f5bfca245d1a888012adff5f7edcaaaadd5b0b65106f0cb985023da87dd0c52c316463f43b84dd391875e8566a224d0b22d2fc2b6bb8ecb87806b9fd77e5359808ee0bdd7dba7e92f1e5780ffad7e4ae529ad73a009ea36075cfed10ca39312971e3430bb01e99b45df85e857cb38ad84c3f3d4fe2c0aa490ac38dbd34d1c72bba77bdfbe4cb4a3561b4d9bd0fc90658927a142ab9c2694e9cf7d58bfe538d19c399cacd39c9b583d9c5476b152ff939c9c1f7ae63da73c62c9bac85cb776de30d537d0ce2e94dd5e080f293de1c8cc0dfee5ab1bf6a32913871cbfa78c71f56ee14a6eafc2c246fc67cdaf12cb609131bb5604a30ad5a401a0ac205fec332941d30356b240bd59b9f6c0ff19fc925fbf4fc66d61727dedd3073c27eaab25ebca22d4de5b9959a6798186ca19e326cba7b790a7a7f8f70766f1086eb400af654160de20d32e753be31d58d41019c13cc1e4d851e0cc891b62b79443bf5c08eac95a2807376cecbf293147a80e1acd8cc8f2e0d47d1107fa11987d54ac17c06232169392514d5b0201aa1cd9b1723a640da971799affe8a73daf182a3721de234970ac3e27f99c2771dea60962a4c0c07168cc6def3a446ebbeb88aa434b313a90ee786dfe2281f3123690ed5eb8f73ff32eaa00272d6f7c8e5f70f3f3eaad7638deaf40722ddce7107d46f714fa65fd051ac70c8cf5008e95b29f07ff56740f735e963756726569b7852ba0f199dfe19cd1af6db4e67db905f2986bacc7aab33a11e48d243a5d10fd383680f037dcee211ea1645396ee1fbfbcefaff36df9d8116467e50a5cfcff6df7fc9386ce80e5c8b152350d104599363a096197b7fd5197be861e2288558b4542ad8c308907b5bf79117a0e283884104c0cce851a6d91a20f32248ccae49982701ee4f7d0e7739062d8494de019e2826d4af45704ccbaf3ee66485442e818c5942f18d7b56cc44cf6e34c47112fa4836fafb2acf5b658dfa598876fd8d58a4e41d3df757bf8b5fd84c2779909c711a04a12643b7b2ab3e66f0e694ddbd0c697dcfa41f08450379dda215bdc99c2c6b68ed505dd4ccc0236a2c79ba8284e3e2ae9285159fee910ab93d87c75fdaec832714e885767780fb7d4a17d9c49c4dcc1141cd54d7493b8b220bcff84c76370981af8de0d622d4bcf6c8c512616ddea878c6b017a53ff2a9467690aefdf01fea019185c80baf8c1b8cc070575cb6aff8ff63a235e2a17bca05e2be8909f752993826a97375675d1d893576d1467cfb105971725b2abe6144933b7da1c84d14a8b8aded2e5a73529d36e82ac77c21bfc00da415b0d19408d9ecb3f4715de5d4bcf5ad8ee74df9f351f75fe1bb834d059d5cb17becd7a827f4ac079159977d3e722cc967ff636dd2bcc911613c4f50bc9bcbc23c3d775df385c58e8a96935820e75b0063262cfa799a74918485479c033a45d9837aa9d0d3d6a0310b7d5ed970929b3936c9c8a397afe2400d79ff7f1c0ffc35fad404fa76c3e61d4c8ab0cc5533b320810c0fbebcc9761612f2d60af74edde120cd8735f33659778194627a4729d26946a57ee6373882b9fbf7c5549b884ccba09f65f9c9492683abcecf3846ff22762e7eb08dd51ce84ec5022eeaf7361c9035acf144496ef79f7aa0302878e6df5460a93ab84f879b019c136189660ab5d07843f42881e65a0658cfeda26a490bcbd5c5137093cd9130b6ad84c25e961d06b6aa28d7ce608777b955fae31f00d43f0b8e1a6e19a9dd83a0b258f7de406e07d11555740b08d50dea96d6a628ea4da64f3ded78e3606b07bc7a330d326c3a13deb514e47a2a4c8dde8ce94f4908b966059841d44a3540f452d60f6ede3028b7f8fab78e54bfd9209e7954037fec19b9ae06708910b11279b286b028edb4ccb21a47bd25d2f3673f894103288a6b8bc3ec8ef276602c3e3ef59a57596d62d3321419466cf5cc677ee6841fe0e0661a814bc2b1d7b2ad25412716e6f536834e6d605b0cf46830efdaf5c7fc18f728a837018865f488d59a710bdfc5f14027bca1ec0e1ed0e1bd8f6c05e92d61960e2bb08a1381624595ae49e20982645cbe22b1a5b26bdeb48722d9a032ac80a37770d7a014695fd25f7141e5eec4d6ef2069e047512a2be78bd074c49bf4f55594657008bb2c89ce03512953486077ddc115152270fdbd7697762be940831cf9e650ab71c489c1ea27a933cbd8803b46a8fa74e942addf30fbb12dcbfb0e040ad5d1824f763929bb1e17d893fc5c00cc814d5608fec30c54e2fd5fe1108a35fe6c4f534572689470d3568d5c83baadad2bf0111b78823cbc39afb8e8c67e3df99e6e4090fd99e8f82f0321479a2bbfd330638470caeec1c3f8980956218daadb43dfc91e3cb030a788b1ebeab474b58f1d3bab1d1c7fa4c269f6680831c30c5ac7b94114665548b35af434eafc1055f44ffa1385deaf09af11464dafdbc2db9ad059e180de096af13aa5918a2e07c968e23c82f69b1b9f7c72852e332a3833ce7eab0a207fca10fb3bec89af8cdb7c80572078e190ff10b24fe9ab3fbc085e1a381a10d10836013e1a55075cafee07df488c6db2286eb2a9bab830ab853e7b2e55a9dea3f4d0c84d4a958eb17cbd56fbe9164f8b5a4a68342db48b7977c160a0dd4fea208b9e9dc626fcd68e9324eb1a379c93e667a66ccffaa9da141dbca228802e086a66e2cecd51350a45c303b6668205b95d5cdc720d3df28ee8354c6e2246674b487beea8d15fa19a9b9d9b9bfcea019ae1440f72e6724a90065a6b6fa805fa00db5283241eb84b3cedecff211ae1182a1f82efd100a8ebf25f9b207f3e09cd6a6ac34b151ad9dac8faed00cc0ec145e637b661a6d4526d5496d0f96ed94dca4c8dd2619be115ab5976470ee211294e0b6c8f947506f380fe092b886b8b2097184f50bbce8aa7f262dcee617abc17ba8c630344b66099cbb4c210650c3cf9bfd34cd6fa8850f3f549f920917f50103c721b8841021afa6e2f705c1dab8845f12fde10b8441dcf5a2aa66202fb51592efab6aa4991eeff8a3546f660f5f02f5a0d8193ee3de2ebe3fa5d3107a2f2d3f1f2923c410a77f12d1d8a8119acb0db7b58673c8dc8233b09fd9cec40124fa485ed7462370cc0a9f3adf69c6a1ce952e2f06dfda8e27036535b2a4c48d7bf0b4b7c797fd3668a9c14cee79b8a2b212bfc90bc4c4f2980b981b2609d84cedd8e9abaf453cb7a183c1164e4bab0312f934200d4f97a5a4eedb89ed241bc4d3ea25bf6fcce89fa4ddcf05fde3bc62c2dbc366a8b1151fe7b7efbc2c105764014cc44fd7d880416b2bf92fe8332e2b174df9d893b7cb255fcae49a7779dbb35662e8a9ddcb7d8253df27e2341b28983bbd316c78dbaf4b387492d9857b42a9c46927660e9ef1bf430977ed6f622f26a1bda4acff9d76c998b9a2f364d9510a9001100623392d20892fa3883e86500503f60962a5144d5f992a8aca24c05af6f568f8f70292f79d85db1ec86aae3e829388f3eb66912fffd23bd8072312b87844475e6d968045a68ed2a007778e6ee7157dd03a5d35c3ea0b7bf966a91fb41f0ad26e549fd88ce4c57834879e7acfbb70544c9e336e30c9cd9c9d6bd027046bd2b313e3354d47c50cc998dbee94da1544338a337598ff298b29909ee3ccd6ce10d45d655ed6ae2529767615b5de174a449e236bfc0c3f", @nested={0x18, 0x4, 0x0, 0x1, [@typed={0xc, 0x79, 0x0, 0x0, @u64=0x7ff}, @typed={0x8, 0x6d, 0x0, 0x0, @fd=r4}]}, @typed={0x14, 0x93, 0x0, 0x0, @ipv6=@loopback}, @generic="567adae71c656bdc33e8dcd23574ee156a2a15d92cff45d492e2b32fc983421b479d450606be2a1a2a256f0e3f0c82d0e59a137b547af5d90e16397a7b7dc92e8bdef39826779e550b2a4eeecbdf2d768921187b3ae83787d46423d44d1146db88089d15549dfa5d22466a691d4dd20ebab9802dc287f4c867b40e1776170d56627cf3b6b9b224e456dffcd46cd67cd596c8d20001e219c20fdc6ec972ff4b7fb3225605f8ea52ca72ce67d24d757e179c6e89e0cf9d692923c84730", @typed={0x8, 0x75, 0x0, 0x0, @pid}, @typed={0xc, 0x31, 0x0, 0x0, @u64=0x8}]}, 0x1130}, 0x1, 0x0, 0x0, 0x8800}, 0x4) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 20:37:41 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2173.467923] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:57 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:37:57 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:37:57 executing program 6: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:37:57 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)={0x1e8, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ec3}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER={0x158, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa7f6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x64010100}}, {0x20, 0x2, @in6={0xa, 0x0, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7ff, @remote, 0x923}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4000040}, 0x94a743c3c0117c14) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) [ 2188.971315] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2188.976378] kauditd_printk_skb: 24 callbacks suppressed [ 2188.976387] audit: type=1326 audit(1705351077.280:789): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16402 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2188.980018] audit: type=1326 audit(1705351077.281:790): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16402 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2188.982573] audit: type=1326 audit(1705351077.282:791): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16402 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:37:57 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x244, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x12c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x14, 0x5, "376034fac72a20a544a923a79f6c75e1"}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:37:57 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:37:57 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x400000000000000) 20:37:57 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000001) [ 2188.989652] audit: type=1326 audit(1705351077.286:793): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16397 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f36e5a75b19 code=0x7ffc0000 [ 2189.013875] audit: type=1326 audit(1705351077.289:794): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16397 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f36e5a75b19 code=0x7ffc0000 [ 2189.026132] audit: type=1326 audit(1705351077.289:795): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16397 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f36e5a75b19 code=0x7ffc0000 [ 2189.029409] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2189.046461] audit: type=1326 audit(1705351077.283:792): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16402 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2189.063912] audit: type=1326 audit(1705351077.293:796): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16402 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:37:57 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000180)=@alg, &(0x7f00000000c0)=0x80, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) [ 2189.065391] EXT4-fs (loop6): mounting ext2 file system using the ext4 subsystem [ 2189.078221] audit: type=1326 audit(1705351077.299:797): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16402 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2189.090788] audit: type=1326 audit(1705351077.299:798): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16397 comm="syz-executor.6" exe="/syz-executor.6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f36e5a75b19 code=0x7ffc0000 20:37:57 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x500000000000000) 20:37:57 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) lseek(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) [ 2189.253667] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2189.280221] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 20:37:57 executing program 1: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000000c06050000000000000000000a0000050900020073797a3000e2ffff0800020073797a32000000000500010007000000cfaa9e377eca69ab4a8909f0d9794859058dc3775b6867c76329c5a606b87d291679a6dee71f2b6370fe485a8ce5977c2cd4ef5e1426c4c20759bfe7df91405a8e7ef9c6403aecbf4ab4473319f8703918dca5b6235863461f46307b4ed402d9f157270c2c496d4890e29139fae337ddd3f373e7e5e81124be33d8a3fb49f11e67903cb24e87580c7304612245921e3fbed8ba7b10800af41247"], 0x34}}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) 20:37:57 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x600000000000000) [ 2189.493700] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:37:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21, 0x70bd29}, 0x14}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000300)=ANY=[], 0x110) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000000)=0x7, 0x4) close_range(r0, r1, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(0xffffffffffffffff, 0x4004f506, &(0x7f00000000c0)=0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x8}}, './file0\x00'}) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x0, 0x25, 0x0, "f72d788f1697d124f4244f2e1c820554885b144442a6062204ee1ea2a6a3a2ea824326a4fae2054e0116ad73bf2f53a92a6f541f19e60a7b493290ab7bb4077499cdf910c6f97dbb8a30f8c6f45975ae"}, 0xd8) 20:37:57 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) 20:37:57 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x700000000000000) [ 2189.767388] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:38:15 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:38:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) getitimer(0x0, &(0x7f0000000080)) 20:38:15 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:38:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x244, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x12c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x14, 0x5, "376034fac72a20a544a923a79f6c75e1"}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:38:15 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00607e636c2c000b4c0aac1f802b3d51a24b8f9eaeb8a904b8baf58a684e42dab4813263ffd51984d70d3b09283c807a575b6763d0a5df60909cc68452f8effb0772b50db105812e24670402e7c24828593b4b768725e04395b180e2e6b48fb864f03e0a89961cf3a70282d3663cf875c739734c0d68d5aeae4a5dbc39cd04413530ae80eb792840d745833fb9b4bb6219c37b10f5981254d899f1afd9ed4ad4366f2554a70e373310387554cab3a7ce2e6dd1ae6cc3e9f9d4734f71a8c74b2729e1640280413d3ab12f22d82b5d349667b93ae39c28dd2c8c24be7dd2a61014227086f8d7e14b761c2c04084048d1c69398b04351c07eb716432c0473c6861b7eba8634f4e20603ec9d26cddcc1752576eb19d3ff98ab160c2f2a476aff2983eaa9ab706016da8f96"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:38:15 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x800000000000000) 20:38:15 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x0) 20:38:15 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x24, 0x66, 0xf01, 0x0, 0x0, {}, [@generic="901e51d4cae5c6b87d41bbc341"]}, 0x24}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup2(r4, r3) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) r7 = syz_genetlink_get_family_id$batadv(0x0, r5) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r6, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0x8, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r7, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0xfec6, 0x39, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x200000c0}, 0x14050884) r8 = socket$packet(0x11, 0x3, 0x300) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000100)={r10, 0x3, 0x6}, 0x10) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000080)={r10, 0x1, 0x6, @dev}, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r7, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r10}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x24040010}, 0x40040) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x44, r7, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1f}]}, 0x44}, 0x1, 0x0, 0x0, 0x20008800}, 0x40000) [ 2207.554575] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2207.593987] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:38:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) getitimer(0x0, &(0x7f0000000080)) [ 2207.644060] device lo entered promiscuous mode [ 2207.660604] device lo left promiscuous mode 20:38:16 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x804000000000000) [ 2207.744535] device lo entered promiscuous mode [ 2207.774025] device lo left promiscuous mode 20:38:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) getitimer(0x0, &(0x7f0000000080)) 20:38:16 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0xfffffffffffffd89, r2, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x90}, 0x40800) [ 2207.900552] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:38:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) getitimer(0x0, &(0x7f0000000080)) 20:38:16 executing program 6: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r0, 0x80047210, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040)) finit_module(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x2) r2 = dup3(r1, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x800040, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@afid={'afid', 0x3d, 0x401}}, {@noextend}, {@dfltgid}, {@fscache}, {@access_client}, {@version_L}], [{@fsname={'fsname', 0x3d, '[*Q!&('}}, {@subj_role={'subj_role', 0x3d, '.-^^'}}, {@uid_lt={'uid<', r4}}, {@smackfsdef}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@appraise_type}]}}) r6 = epoll_create(0x8) r7 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder-control\x00', 0x1000, 0x0) r8 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x4) r9 = dup2(r7, r8) ioctl$TIOCMSET(r8, 0x5418, &(0x7f0000000340)=0x40) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/zoneinfo\x00', 0x0, 0x0) copy_file_range(r0, &(0x7f0000000380)=0x394, r10, &(0x7f0000000400)=0x4, 0xfffffffffffffff7, 0x0) pread64(r10, &(0x7f0000000440)=""/22, 0x16, 0x200) r11 = accept4$unix(r2, &(0x7f0000000480), &(0x7f0000000500)=0x6e, 0x80800) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) sendmsg$unix(r11, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000540)="be2064ec40ea5bd916f43c0c6fd827ab7d50038183e1fa8353b42cdbc5362f45c9cebb6119eeb728008da950aae384d801c5e22ee9565e6172ba85a294986fbb23b3abd13db8aa09e2515799bcf82435f934493f495744f5ae85c39292c41caf5c82e178c24a082c14999041e1631c01d167538c4b29dc5b55916aa9bb2933a1848bcb0cd7a4dc1bbd674cd3c617b078e2d1bc9de2931e1669105347bac3e9aca6f78c513c9ada844a4a15", 0xab}, {&(0x7f0000000600)="81a8c2adb0be59bc17f575e047e725b93d2ca5bb527249c2d6145b88b9e2b51df0eb2c53f93d763098144264268cb2d8a0d0e8cb431cba4c20f91aea8ed66b5d55c721ea5ecd5b4087c7ee7a78c5a0ca8b68177f0f817efabfe505a9a045755ab68b67ebb1583168a4c91270f1b00c641589660fce9e31cf76af7340476d8f48a7d32a86f3f5515c6846427289", 0x8d}, {&(0x7f00000006c0)="48ff6ed8d74483894c25e582895abe4086d05e3dcf9ff6a11ab5f15c75496d07a982da10bc0a902874f415289c7299236d4012f2a17cb29a133c217023a338753b47f7d4b0a44a2a0cbba7e5d6fb4fce67df0ad6889bb6a8f37a93b2a30480959aeac4cfc0ddb47c887f1dcb31bc8f4206428019b46a752b19075d1e50398fb53adc5c3c682cc4b492f77c2ead904c1dd411db0a7e287cd1bd0f413b71a17836d96268410b7c83014dc2cfd1f1481c9b9c151aa34949e3aa0ce685996c8201", 0xbf}, {&(0x7f0000000780)="c3115661ae4b807cadb33ba976c3b6093b4652eeff775ceabe29856454ddb697ffb9cbe7439ee26ba360753192fb493dafd701a10748c14de63adfed5ca4eee20946fe5b98fd6de3606059006dcad498ef3c373b25ab92aee0fd6d670561eb", 0x5f}, {&(0x7f0000000800)="290f89517b30aa2e68e52295b326d3de913feb8aacc8a8410362a9c969360ece53ba6a69c314c9cac0ce86bc4d3d0cda029afaa88c7f762c886b94bf898b93b6a8c55461b2d6cbea4c60fca4ca931e0e0f0a34f8713604e15dc380abf163c4629176b47d582da0ee5f319cacb70b43afc8b455a010e788e6d869ba7fbe589ca71656cc58ec7a768e0f37b929afbb3325deed0fa217b6d32219ac0b0647430da6f585e3be2f57319be3370f823be30d73cfaf1ec541f55df49a6062b3ef5cc48db89c", 0xc2}, {&(0x7f0000000900)="b773780b3a8144c8e3ebf9f74117dcb324cfc9ed280932cc3108f2f4bced2842db3774104a4bb26c10cc68145a9c1fc55c5dd926facbf833eb18febdb535e59098588142e3c1bced5330a21b5b782d1b8da09bdf754a381f1936a17cc30f623a1f08f0ae93aa509d93bd01c3a416d2b0058752cdfe8dcebcbc16e41f862447cd7101ff8747ab1b8fe8c86255", 0x8c}, {&(0x7f00000009c0)="16a4324134b968a626a5a3db189f32a8ec865ea153f7e7eeeb045565de4311c8b9799ec49198a6d8f3aedff45412de625bb7cd5fe22837215fc92e2442cdffc0d3802d1a928fcc5314748af40292699821358104dea8ee1248c85cc1116ab1fdc58c7582d473ed495e9720759f94", 0x6e}, {&(0x7f0000000a40)="bd240a85e67d36c5ca6643b6346e6ee5cef3e41a84715aa63124f6757a42649f82f5c1120ac3a647e7d5523cd766fa0fc875a4f611dd6d122f2123cac3a61d9b720f99839cbd81026f316becbd2d91cf4fc2dde696c07753ec0dfc895ffa5a98beed16cd71719375cef13742840bd0af215ae7de0b389932a6dabc5d5ba284b61065e1533ac96267abf84d1f4531b7f5ae6f6f678ca8976080aaf272deefe29ec0d29b26564e1bcdfa83351b0329de7195c86203fcc15024f9d2a91f49", 0xbd}], 0x8, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {r3, r4, r12}}}, @rights={{0x24, 0x1, 0x1, [r8, r13, 0xffffffffffffffff, 0xffffffffffffffff, r10]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r9, r9, r6, r1]}}, @rights={{0x28, 0x1, 0x1, [r6, r9, 0xffffffffffffffff, r0, r1, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r7, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}, @rights={{0x24, 0x1, 0x1, [r2, r8, 0xffffffffffffffff, r6, r2]}}], 0x120, 0x4000800}, 0x11) 20:38:16 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x900000000000000) 20:38:16 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2208.204729] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:38:34 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x804000000000000) 20:38:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) getitimer(0x0, &(0x7f0000000080)) 20:38:34 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xa00000000000000) 20:38:34 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:38:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x244, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x12c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x14, 0x5, "376034fac72a20a544a923a79f6c75e1"}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2226.253276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:38:34 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:38:34 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:38:34 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x0) [ 2226.291928] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 20:38:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) getitimer(0x0, &(0x7f0000000080)) [ 2226.304059] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:38:34 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000104050000000000000000000000f41e760c79873d27e15288c282bb7f345c7f8106db30752a9ae5037ceb249ad0fdbd5a2abb16228b8c7c0f96"], 0x1c}}, 0x0) dup3(r1, r0, 0x0) 20:38:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getitimer(0x0, &(0x7f0000000080)) [ 2226.436375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2226.452360] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 20:38:34 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xb00000000000000) 20:38:35 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getitimer(0x0, &(0x7f0000000080)) 20:38:35 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getitimer(0x0, &(0x7f0000000080)) [ 2226.786528] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:38:35 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) 20:38:35 executing program 6: r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x10018}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0xffffffffffffffff, 0xd, 0x0, &(0x7f0000000080)) stat(&(0x7f0000000140)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r2 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000440)=@IORING_OP_SEND={0x1a, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)="acd1f5d4e44044b500a8d85d118117e19bdb214dd58498b8f50f6640b264a81d52f07bfc7a7c67921127e7f077bdf6c13ba42a10429b", 0x36, 0x0, 0x1}, 0x0) syz_io_uring_setup(0x40db, &(0x7f00000001c0)={0x0, 0xad43, 0x10, 0x3, 0x2e9, 0x0, r2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)) syz_io_uring_setup(0x687f, &(0x7f00000002c0)={0x0, 0xc79f, 0x2, 0x2, 0x139, 0x0, r2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000340)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000380)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd=r0, 0x0, 0x0, 0x6, 0x3, 0x0, {0x0, 0x0, r1}}, 0x1ff) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, r7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, r0, 0x0, 0x0, 0xe5, 0x0, 0x23456}, 0x8) prlimit64(0x0, 0x9, &(0x7f0000000040), 0x0) setuid(0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x40) 20:38:35 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xd00000000000000) 20:38:35 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x17, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2227.087130] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2227.129231] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:38:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) 20:38:51 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xf00000000000000) 20:38:51 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r2, 0x6}) ptrace(0x8, r1) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r1, 0x10, 0xffffffffffffffff, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:38:51 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x0) 20:38:51 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:38:51 executing program 6: r0 = dup(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x10018}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0xffffffffffffffff, 0xd, 0x0, &(0x7f0000000080)) stat(&(0x7f0000000140)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r2 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000240)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000440)=@IORING_OP_SEND={0x1a, 0x5, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)="acd1f5d4e44044b500a8d85d118117e19bdb214dd58498b8f50f6640b264a81d52f07bfc7a7c67921127e7f077bdf6c13ba42a10429b", 0x36, 0x0, 0x1}, 0x0) syz_io_uring_setup(0x40db, &(0x7f00000001c0)={0x0, 0xad43, 0x10, 0x3, 0x2e9, 0x0, r2}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)) syz_io_uring_setup(0x687f, &(0x7f00000002c0)={0x0, 0xc79f, 0x2, 0x2, 0x139, 0x0, r2}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000240), &(0x7f0000000340)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000380)=@IORING_OP_TEE={0x21, 0x5, 0x0, @fd=r0, 0x0, 0x0, 0x6, 0x3, 0x0, {0x0, 0x0, r1}}, 0x1ff) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r2, 0xa, 0x0, r7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, r0, 0x0, 0x0, 0xe5, 0x0, 0x23456}, 0x8) prlimit64(0x0, 0x9, &(0x7f0000000040), 0x0) setuid(0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x0, @none}, 0xe) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x40) [ 2243.510980] kauditd_printk_skb: 25 callbacks suppressed [ 2243.510992] audit: type=1326 audit(1705351131.816:824): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2243.515543] audit: type=1326 audit(1705351131.821:825): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:38:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x17, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:38:51 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2243.529870] audit: type=1326 audit(1705351131.821:826): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2243.538778] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2243.539985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2243.545303] audit: type=1326 audit(1705351131.821:827): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:38:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) [ 2243.561181] audit: type=1326 audit(1705351131.833:828): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2243.580658] audit: type=1326 audit(1705351131.834:829): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2243.583403] audit: type=1326 audit(1705351131.834:830): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2243.602830] audit: type=1326 audit(1705351131.839:831): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2243.609919] audit: type=1326 audit(1705351131.839:832): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2243.622023] audit: type=1326 audit(1705351131.840:833): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=16965 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:38:51 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x1100000000000000) 20:38:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x17, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:38:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getitimer(0x0, &(0x7f0000000080)) 20:38:51 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x2000000000000000) [ 2243.689934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2243.814253] perf: interrupt took too long (7817 > 7800), lowering kernel.perf_event_max_sample_rate to 25000 20:39:10 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r2, 0x6}) ptrace(0x8, r1) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r1, 0x10, 0xffffffffffffffff, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:39:10 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:39:10 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 1) 20:39:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x17, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:39:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getitimer(0x0, &(0x7f0000000080)) 20:39:10 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:39:10 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x40, 0x0, 0x1, 0x301, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x28}}}, @CTA_TUPLE_PROTO={0xfffffffffffffee5, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x40}}, 0x0) 20:39:10 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x2400000000000000) [ 2262.189214] kauditd_printk_skb: 12 callbacks suppressed [ 2262.189231] audit: type=1326 audit(1705351150.495:846): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2262.191029] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2262.198848] audit: type=1326 audit(1705351150.504:847): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2262.212803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2262.214944] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2262.216711] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 2262.228159] audit: type=1326 audit(1705351150.516:848): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2262.250232] audit: type=1326 audit(1705351150.521:849): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2262.251120] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2262.274741] audit: type=1326 audit(1705351150.526:850): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17113 comm="syz-executor.1" exe="/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fdc09c49b19 code=0x0 [ 2262.321006] audit: type=1326 audit(1705351150.528:851): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:39:10 executing program 6: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0xee01, 0xee00}, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}) shmctl$SHM_LOCK(0x0, 0xb) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x2000) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/59) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_LOCK(r0, 0xb) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x5000) 20:39:10 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x3f00000000000000) [ 2262.350398] FAULT_INJECTION: forcing a failure. [ 2262.350398] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.353542] CPU: 1 PID: 17123 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2262.354963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2262.356674] Call Trace: [ 2262.357264] dump_stack+0x107/0x167 [ 2262.358049] should_fail.cold+0x5/0xa [ 2262.358856] ? alloc_pipe_info+0x10a/0x590 [ 2262.359733] should_failslab+0x5/0x20 [ 2262.360521] kmem_cache_alloc_trace+0x55/0x320 [ 2262.361483] alloc_pipe_info+0x10a/0x590 [ 2262.362325] splice_direct_to_actor+0x774/0x980 [ 2262.363285] ? _cond_resched+0x12/0x80 [ 2262.364097] ? inode_security+0x107/0x140 [ 2262.364948] ? pipe_to_sendpage+0x380/0x380 [ 2262.365842] ? selinux_file_permission+0x92/0x520 [ 2262.366843] ? do_splice_to+0x160/0x160 [ 2262.367664] ? security_file_permission+0x24e/0x570 [ 2262.368707] do_splice_direct+0x1c4/0x290 [ 2262.369575] ? splice_direct_to_actor+0x980/0x980 [ 2262.370562] ? selinux_file_permission+0x92/0x520 [ 2262.371569] ? security_file_permission+0x24e/0x570 [ 2262.372618] do_sendfile+0x553/0x1090 [ 2262.373427] ? do_pwritev+0x270/0x270 [ 2262.374221] ? wait_for_completion_io+0x270/0x270 [ 2262.375254] ? rcu_read_lock_any_held+0x75/0xa0 [ 2262.376213] ? vfs_write+0x354/0xa70 [ 2262.376982] __x64_sys_sendfile64+0x1d1/0x210 [ 2262.377933] ? __ia32_sys_sendfile+0x220/0x220 [ 2262.378883] do_syscall_64+0x33/0x40 [ 2262.379636] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2262.380703] RIP: 0033:0x7f85f7bb8b19 [ 2262.381733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2262.385541] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2262.387107] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2262.388564] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2262.390029] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2262.391487] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2262.392948] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 [ 2262.412325] audit: type=1326 audit(1705351150.530:852): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2262.427259] audit: type=1326 audit(1705351150.533:853): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2262.474741] audit: type=1326 audit(1705351150.533:854): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2262.501711] audit: type=1326 audit(1705351150.542:855): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17104 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:39:10 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r2) sendmsg$IEEE802154_LIST_PHY(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r3, 0x731}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_KEY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r3, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x800) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r5, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r5, r4, 0x0, 0x9bbb) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f00000014c0)=@updsa={0x150, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d2, 0x32}, @in6=@private0, {}, {}, {0x0, 0x0, 0x2}, 0x0, 0x0, 0xa}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}, @etimer_thresh={0x8}]}, 0x150}}, 0x0) [ 2262.680202] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2262.812557] perf: interrupt took too long (9780 > 9771), lowering kernel.perf_event_max_sample_rate to 20000 20:39:11 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) r2 = signalfd4(r1, &(0x7f0000000580)={[0x2]}, 0x8, 0x80000) bind$inet6(r2, &(0x7f00000005c0)={0xa, 0x4e21, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x10001}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00', 0x0, 0x40}}) preadv(r3, &(0x7f0000000500)=[{&(0x7f0000000100)=""/95, 0x5f}, {&(0x7f0000000180)=""/161, 0xa1}, {&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000240)=""/224, 0xe0}, {&(0x7f0000000340)=""/50, 0x32}, {&(0x7f0000000440)=""/163, 0xa3}, {&(0x7f0000000380)=""/108, 0x6c}], 0x7, 0x0, 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x20040011) 20:39:11 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x4000000000000000) 20:39:11 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r2, 0x6}) ptrace(0x8, r1) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r1, 0x10, 0xffffffffffffffff, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:39:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getitimer(0x0, &(0x7f0000000080)) [ 2263.106870] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:39:11 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000940)='./file0\x00', 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000980)="c4b5debffc4e53d73cca831620793cbc45fdb80a38739610c90ec75267c3ef9997d14391174815a93f658487ea5ad85411ee43ffef8ebf66828e1a06014f3e92b1b6c39b91c224fe1541d4f26ac75fb24c162e47dd861bf954b547dd77fd6e", 0x5f, 0x5}], 0x201000, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0xfffffffffffffe1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$inet(r1, &(0x7f00000005c0)={&(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="107884a9ef225f2896d71e594626918fb6c82bad51398d6fe0a83c2744a69e7c7b8e6195f1ae14fd581d558be289884bdac513243f9d6e0e915d24647791229e068dd6e7e26d5133840d8bdbb06c6fe4804371370bc284e0a093f1ea149bfd0c784d2e044095920636525d10ad898b303b36333f741770a49a51f0da5cde2918c20404cc33", 0x85}, {0x0}, {&(0x7f0000000300)="ea9c1d79849a38eaa69a8b12c715fd827f69e3de23468e88c88e08f88d669578b7e4d4422bc7dec660a5987ba86709776e19ce65d0f665cc6943c192b7686da252ac2a74360ac1e117949051954d90631c88b928ad076976409560d22914ef1fadf78787a842f8c8e7c6603306e24983e8b0117378d0891ee46a53a58ac410446e55fcbdc5290c71f1885725c7b071cdc4f1080e8b0278527df1cdd3f11dc7e89ac35d", 0xa3}, {&(0x7f00000004c0)="f48acb94fc10c404b6447fa26d8945049f4ed92923a33fdbbaddc3b96c630fbf04a89bb3468cfc0da32f0c58d2f645070b0026a76ccc5c92e103833308d30fbed54c477b34f0f42d03e9577ea833f142658285536a03a0a4e1208e204e726da97d7c65ed7c8c89e8144b80bf178f4b6f0da53d20d30ce9a0d42a0d6f39a2034d9bc16b7c1861ee1be48eda20ec27ea8be78768af7ea0d73948412ba085a909bbffd18803d75d7f47e26598552aa70c286051f029c0fb2f0d4cd8b01c2c0ecb827a3d0811bca6ea", 0xc7}, {&(0x7f00000007c0)="c7cfdce8c05af2cfdd46958a5b30f09e7653905911471e42e2ff2100f9064cdf82c4e80228f23135a4292462b3378af2f9da981de950c344b2e0fb0aa7f1d12f1f860be1c1eca9e249d7ed15a992ef47a81203e4588fa51e046f9998f06651bda3ac767ee91f3888518bd5a5b493e4c289537f6386fcd037ad77e0f93c3d3a1e2ac7d9a64f8a4d37e1392a48ed4c4b58753907317fcb0879a6c4f0d8113101058405b1701074", 0xa6}], 0x5, &(0x7f0000000280)}, 0xd0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') write$bt_hci(r2, &(0x7f00000008c0)=ANY=[@ANYBLOB="013820230000000012dbe6b4d1d76368674a3ef38585c16ef75824ef9d0ed8947ff4cc2517873fa64e0f25b2210ec2d29715d00394981beb5ab2c993e3fae0e879d1f27e276eb6d4d085a904f664058c664469253b93fb55921b8e892592cb0ca450a81bab"], 0x27) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000003000/0x4000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000040)="ae19e9710b", 0x5, r2}, 0x68) r3 = add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000640)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e0ffd29439a06000000000000001c1d1e1f202122232425262728292a2b2c2d2e2f2025fbb53435363738393a3b3c3d3e3f405c60c24d33c53ec7d97c570cc7eb7e9f3821450041b7f279bdf1acd68d1df22325ec445a3cdebc035a95229bf276942391fa3344dd65335dd235b80917862cd1fcad7832e67fc52fabbbee2622a731831ada03f46396b75240987af3b5e286eafddeae6cc506333fa310b3652f177e40f3e1a285e07e81098b46950fb39d9cd8ad2fde00008819f2bc2042f22c06b9a4b2f7adecde9510cdf7e1d2bd314f4108386a6e5d67b3e5a49ae8522bf4fc3bf98d061a73a592ff8a057555f802ee0b6c9147954229171a76b6bad0088f370cbe52b44572fd9f91676d2ae50784e3f9f53f7720480752cf6572d98827b1a4e7ffce7819830529b419eb50333dbee0"], 0x48, r3) add_key$keyring(&(0x7f0000000240), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r4) socket$packet(0x11, 0x2, 0x300) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x828000, 0x0, 0x0, 0x0, {0x4000023}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) 20:39:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x18, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2263.197005] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:39:27 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 2) 20:39:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000940)='./file0\x00', 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000980)="c4b5debffc4e53d73cca831620793cbc45fdb80a38739610c90ec75267c3ef9997d14391174815a93f658487ea5ad85411ee43ffef8ebf66828e1a06014f3e92b1b6c39b91c224fe1541d4f26ac75fb24c162e47dd861bf954b547dd77fd6e", 0x5f, 0x5}], 0x201000, &(0x7f0000000140)) perf_event_open(&(0x7f0000001d80)={0x1, 0xfffffffffffffe1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$inet(r1, &(0x7f00000005c0)={&(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="107884a9ef225f2896d71e594626918fb6c82bad51398d6fe0a83c2744a69e7c7b8e6195f1ae14fd581d558be289884bdac513243f9d6e0e915d24647791229e068dd6e7e26d5133840d8bdbb06c6fe4804371370bc284e0a093f1ea149bfd0c784d2e044095920636525d10ad898b303b36333f741770a49a51f0da5cde2918c20404cc33", 0x85}, {0x0}, {&(0x7f0000000300)="ea9c1d79849a38eaa69a8b12c715fd827f69e3de23468e88c88e08f88d669578b7e4d4422bc7dec660a5987ba86709776e19ce65d0f665cc6943c192b7686da252ac2a74360ac1e117949051954d90631c88b928ad076976409560d22914ef1fadf78787a842f8c8e7c6603306e24983e8b0117378d0891ee46a53a58ac410446e55fcbdc5290c71f1885725c7b071cdc4f1080e8b0278527df1cdd3f11dc7e89ac35d", 0xa3}, {&(0x7f00000004c0)="f48acb94fc10c404b6447fa26d8945049f4ed92923a33fdbbaddc3b96c630fbf04a89bb3468cfc0da32f0c58d2f645070b0026a76ccc5c92e103833308d30fbed54c477b34f0f42d03e9577ea833f142658285536a03a0a4e1208e204e726da97d7c65ed7c8c89e8144b80bf178f4b6f0da53d20d30ce9a0d42a0d6f39a2034d9bc16b7c1861ee1be48eda20ec27ea8be78768af7ea0d73948412ba085a909bbffd18803d75d7f47e26598552aa70c286051f029c0fb2f0d4cd8b01c2c0ecb827a3d0811bca6ea", 0xc7}, {&(0x7f00000007c0)="c7cfdce8c05af2cfdd46958a5b30f09e7653905911471e42e2ff2100f9064cdf82c4e80228f23135a4292462b3378af2f9da981de950c344b2e0fb0aa7f1d12f1f860be1c1eca9e249d7ed15a992ef47a81203e4588fa51e046f9998f06651bda3ac767ee91f3888518bd5a5b493e4c289537f6386fcd037ad77e0f93c3d3a1e2ac7d9a64f8a4d37e1392a48ed4c4b58753907317fcb0879a6c4f0d8113101058405b1701074", 0xa6}], 0x5, &(0x7f0000000280)}, 0xd0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') write$bt_hci(r2, &(0x7f00000008c0)=ANY=[@ANYBLOB="013820230000000012dbe6b4d1d76368674a3ef38585c16ef75824ef9d0ed8947ff4cc2517873fa64e0f25b2210ec2d29715d00394981beb5ab2c993e3fae0e879d1f27e276eb6d4d085a904f664058c664469253b93fb55921b8e892592cb0ca450a81bab"], 0x27) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000003000/0x4000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000040)="ae19e9710b", 0x5, r2}, 0x68) r3 = add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) r4 = add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x48, r3) add_key$keyring(&(0x7f0000000240), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000280), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, r4) socket$packet(0x11, 0x2, 0x300) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) clone3(&(0x7f0000000ac0)={0x828000, 0x0, 0x0, 0x0, {0x4000023}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) 20:39:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, 0x0) 20:39:27 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x5505000000000000) [ 2279.123083] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:39:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x18, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:39:27 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:39:27 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2279.134184] kauditd_printk_skb: 25 callbacks suppressed 20:39:27 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2279.134200] audit: type=1326 audit(1705351167.440:881): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2279.140440] audit: type=1326 audit(1705351167.440:882): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2279.166468] audit: type=1326 audit(1705351167.440:883): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:39:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, 0x0) [ 2279.197650] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2279.199872] audit: type=1326 audit(1705351167.440:884): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2279.226739] audit: type=1326 audit(1705351167.440:885): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2279.240192] audit: type=1326 audit(1705351167.453:886): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2279.245388] FAULT_INJECTION: forcing a failure. [ 2279.245388] name failslab, interval 1, probability 0, space 0, times 0 [ 2279.248046] CPU: 0 PID: 17414 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2279.249460] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2279.251148] Call Trace: [ 2279.251683] dump_stack+0x107/0x167 [ 2279.252430] should_fail.cold+0x5/0xa [ 2279.253205] ? create_object.isra.0+0x3a/0xa20 [ 2279.254143] should_failslab+0x5/0x20 [ 2279.254918] kmem_cache_alloc+0x5b/0x310 [ 2279.255752] create_object.isra.0+0x3a/0xa20 [ 2279.256642] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2279.257694] kmem_cache_alloc_trace+0x151/0x320 [ 2279.258654] alloc_pipe_info+0x10a/0x590 [ 2279.259493] splice_direct_to_actor+0x774/0x980 [ 2279.260446] ? _cond_resched+0x12/0x80 [ 2279.261235] ? inode_security+0x107/0x140 [ 2279.262088] ? pipe_to_sendpage+0x380/0x380 [ 2279.262965] ? selinux_file_permission+0x92/0x520 [ 2279.263946] ? do_splice_to+0x160/0x160 [ 2279.264758] ? security_file_permission+0x24e/0x570 [ 2279.265794] do_splice_direct+0x1c4/0x290 [ 2279.266634] ? splice_direct_to_actor+0x980/0x980 [ 2279.267601] ? selinux_file_permission+0x92/0x520 [ 2279.268580] ? security_file_permission+0x24e/0x570 [ 2279.269609] do_sendfile+0x553/0x1090 [ 2279.270412] ? do_pwritev+0x270/0x270 [ 2279.271214] ? wait_for_completion_io+0x270/0x270 [ 2279.272189] ? rcu_read_lock_any_held+0x75/0xa0 [ 2279.273144] ? vfs_write+0x354/0xa70 [ 2279.273927] __x64_sys_sendfile64+0x1d1/0x210 [ 2279.274514] audit: type=1326 audit(1705351167.454:887): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2279.274853] ? __ia32_sys_sendfile+0x220/0x220 [ 2279.278309] do_syscall_64+0x33/0x40 [ 2279.279075] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2279.280127] RIP: 0033:0x7f85f7bb8b19 [ 2279.280892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2279.284686] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2279.286244] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2279.287695] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2279.289144] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2279.290610] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2279.292059] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 [ 2279.294903] audit: type=1326 audit(1705351167.455:888): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:39:27 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x7fe2000000000000) [ 2279.317677] audit: type=1326 audit(1705351167.455:889): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2279.320338] audit: type=1326 audit(1705351167.455:890): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17379 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:39:27 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, 0x0) [ 2279.415153] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:39:27 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:39:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x18, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:39:27 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x8000000000000000) [ 2279.692416] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:39:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) (fail_nth: 1) [ 2279.754720] FAULT_INJECTION: forcing a failure. [ 2279.754720] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2279.756058] CPU: 1 PID: 17512 Comm: syz-executor.1 Not tainted 5.10.207 #1 [ 2279.756803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2279.757693] Call Trace: [ 2279.757980] dump_stack+0x107/0x167 [ 2279.758373] should_fail.cold+0x5/0xa [ 2279.758809] _copy_to_user+0x2e/0x180 [ 2279.759225] __x64_sys_getitimer+0x187/0x1d0 [ 2279.759699] ? do_setitimer+0x6d0/0x6d0 [ 2279.760143] ? ksys_write+0x1a9/0x260 [ 2279.760575] ? syscall_trace_enter.constprop.0+0x10d/0x1e0 [ 2279.761174] do_syscall_64+0x33/0x40 [ 2279.761576] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2279.762140] RIP: 0033:0x7fdc09c49b19 [ 2279.762548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2279.764576] RSP: 002b:00007fdc071bf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000024 [ 2279.765450] RAX: ffffffffffffffda RBX: 00007fdc09d5cf60 RCX: 00007fdc09c49b19 [ 2279.766287] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 2279.767059] RBP: 00007fdc071bf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2279.767868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2279.768692] R13: 00007fff9fea530f R14: 00007fdc071bf300 R15: 0000000000022000 [ 2279.783870] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:39:28 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x8004000000000000) [ 2280.128362] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2295.676382] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2295.681698] kauditd_printk_skb: 23 callbacks suppressed [ 2295.681715] audit: type=1326 audit(1705351183.987:914): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2295.702383] FAULT_INJECTION: forcing a failure. [ 2295.702383] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2295.705272] CPU: 1 PID: 17635 Comm: syz-executor.1 Not tainted 5.10.207 #1 [ 2295.706774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2295.708558] Call Trace: [ 2295.709133] dump_stack+0x107/0x167 [ 2295.709947] should_fail.cold+0x5/0xa [ 2295.710783] _copy_to_user+0x2e/0x180 [ 2295.711617] simple_read_from_buffer+0xcc/0x160 [ 2295.712638] proc_fail_nth_read+0x198/0x230 [ 2295.713586] ? proc_sessionid_read+0x230/0x230 [ 2295.714603] ? security_file_permission+0x24e/0x570 [ 2295.715694] ? perf_trace_initcall_start+0x101/0x380 [ 2295.716822] ? proc_sessionid_read+0x230/0x230 [ 2295.717822] vfs_read+0x228/0x580 [ 2295.718607] ksys_read+0x12d/0x260 [ 2295.719388] ? vfs_write+0xa70/0xa70 [ 2295.720231] do_syscall_64+0x33/0x40 [ 2295.721041] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2295.722162] RIP: 0033:0x7fdc09bfc69c [ 2295.722975] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2295.726986] RSP: 002b:00007fdc071bf170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2295.728634] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdc09bfc69c [ 2295.730205] RDX: 000000000000000f RSI: 00007fdc071bf1e0 RDI: 0000000000000003 [ 2295.731759] RBP: 00007fdc071bf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2295.733309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2295.734887] R13: 00007fff9fea530f R14: 00007fdc071bf300 R15: 0000000000022000 [ 2295.742232] audit: type=1326 audit(1705351183.994:915): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2295.766347] FAULT_INJECTION: forcing a failure. [ 2295.766347] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.769074] CPU: 1 PID: 17639 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2295.770557] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2295.772299] Call Trace: [ 2295.772860] dump_stack+0x107/0x167 [ 2295.773638] should_fail.cold+0x5/0xa [ 2295.774469] ? alloc_pipe_info+0x1e5/0x590 [ 2295.775372] should_failslab+0x5/0x20 [ 2295.776180] __kmalloc+0x72/0x390 [ 2295.776916] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2295.777998] alloc_pipe_info+0x1e5/0x590 [ 2295.778855] splice_direct_to_actor+0x774/0x980 [ 2295.779849] ? _cond_resched+0x12/0x80 [ 2295.780680] ? inode_security+0x107/0x140 [ 2295.781548] ? pipe_to_sendpage+0x380/0x380 [ 2295.782482] ? selinux_file_permission+0x92/0x520 [ 2295.783517] ? do_splice_to+0x160/0x160 [ 2295.784365] ? security_file_permission+0x24e/0x570 [ 2295.785443] do_splice_direct+0x1c4/0x290 [ 2295.786335] ? splice_direct_to_actor+0x980/0x980 [ 2295.787355] ? selinux_file_permission+0x92/0x520 [ 2295.788395] ? security_file_permission+0x24e/0x570 [ 2295.789479] do_sendfile+0x553/0x1090 [ 2295.790321] ? do_pwritev+0x270/0x270 [ 2295.791145] ? wait_for_completion_io+0x270/0x270 [ 2295.792177] ? rcu_read_lock_any_held+0x75/0xa0 [ 2295.793156] ? vfs_write+0x354/0xa70 [ 2295.793966] __x64_sys_sendfile64+0x1d1/0x210 [ 2295.794929] ? __ia32_sys_sendfile+0x220/0x220 [ 2295.795910] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2295.797015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2295.798123] do_syscall_64+0x33/0x40 [ 2295.798915] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2295.800000] RIP: 0033:0x7f85f7bb8b19 [ 2295.800790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2295.804706] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2295.806320] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2295.807834] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2295.809341] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2295.810855] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2295.812366] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 [ 2295.847402] FAT-fs (loop6): Directory bread(block 3) failed [ 2295.848884] FAT-fs (loop6): Directory bread(block 4) failed [ 2295.850830] FAT-fs (loop6): Directory bread(block 5) failed [ 2295.852153] FAT-fs (loop6): Directory bread(block 6) failed 20:39:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) (fail_nth: 2) 20:39:43 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 3) 20:39:43 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:39:43 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x8102000000000000) 20:39:43 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:39:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x244, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x12c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:39:43 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:39:43 executing program 6: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) [ 2295.861908] FAT-fs (loop6): Directory bread(block 7) failed [ 2295.864671] audit: type=1326 audit(1705351183.994:916): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2295.866860] FAT-fs (loop6): Directory bread(block 8) failed [ 2295.867323] audit: type=1326 audit(1705351183.994:917): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2295.870894] FAT-fs (loop6): Directory bread(block 9) failed sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000140)={0x288, r0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffc0}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xefc5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0xbc, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x192}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x90, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2c37}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x4000800}, 0x20042040) r1 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020101000270008000f801", 0x17}, {0x0, 0x0, 0x1e0}], 0x0, &(0x7f0000000000)={[{@fat=@nocase}]}) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000500), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000680)={'syztnl1\x00', &(0x7f0000000600)={'ip6gre0\x00', 0x0, 0x2f, 0x8e, 0x5, 0x8, 0x30, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty, 0x8, 0x700, 0xaf4, 0x3}}) socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) readlinkat(r1, &(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)=""/18, 0x12) sendfile(r4, r3, 0x0, 0x9bbb) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c901900", @ANYRES16=r5, @ANYBLOB="210600000000000000001a0000000700210061610000"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000a00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000580)={0x64, r5, 0x4, 0x70bd2d, 0x25dfdbff, {{}, {@void, @void}}, [@mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x18, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}], @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x20040000}, 0x24000081) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000940)={&(0x7f0000000ac0)={0x3cc, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0xd8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xd4, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc2c}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, 'ib\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\\\xa0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc43}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ',}.\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'vfat\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd63}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_FEATURES_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x22c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb4f}]}]}, @ETHTOOL_A_BITSET_VALUE={0xfa, 0x4, "1eda49d5e25c8d2d7a1f671f4abb8ab8ed3c94fec11ce3b1253708177637969678d355239d11467a0f49d1ae23434572e1466847334ee87ba964a4565917f24c1ada4dfda7948bc19192cf97cb4c4de48da962dc62960d45f34e2e8ed31ab9f980f990f854e31e5a0362a0a17b3e2e9302e8ba130917b3e7c25886b15d72ced52b9394890657173f1c116f1eda2ce77bdbdad8afed9736cd4b4842bb95c8ef64cfb0f3c960b82597478b520192c45b09c6d47950ce780748bbecf1c78ac9bd11d578a4a94bde2f3d6369ecebe0c6b4c00e9e1910f6bdd050531755dba1dd006be67503ccae39a2b0d4bf5359e723b0901c8ab69cac21"}, @ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'netpci0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_NAME={0x14, 0x2, ' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x94ec}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'nocase'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2e57}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'nocase'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\xaa\\\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, 'syz0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '),\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_FEATURES_WANTED={0x20, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x1a, 0x4, "e836e6005ff63675013954cd47abad6bc2e0d5782f1a"}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x3cc}, 0x1, 0x0, 0x0, 0x48084}, 0x0) [ 2295.908888] audit: type=1326 audit(1705351183.994:918): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2295.911661] audit: type=1326 audit(1705351183.995:919): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:39:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) 20:39:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x244, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x12c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:39:44 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2295.939629] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2295.967794] audit: type=1326 audit(1705351183.995:920): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2295.987533] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2295.997818] audit: type=1326 audit(1705351184.057:921): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:39:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x2, &(0x7f0000000080)) 20:39:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x80000001) keyctl$set_timeout(0xf, r0, 0xd6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x480) r1 = fork() sched_setattr(r1, &(0x7f0000000100)={0x38, 0x5, 0x46, 0x6, 0x3ff, 0x3, 0x9, 0x1, 0x0, 0x8000}, 0x0) keyctl$invalidate(0x15, 0x0) setgid(0x0) keyctl$chown(0x4, r0, 0xee01, 0x0) r2 = getpgrp(0xffffffffffffffff) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r3, r4, 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x600, 0xffffffff, 0x9, 0xffff, 0x2, 0x3b16, 0x8b0d}, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000001180), &(0x7f0000001300)={'fscrypt:', @desc2}, &(0x7f0000001340)={0x0, "9efd48cf39d5722d2525343efebd8efe723aed05f0ffafa2734185fda322e061c85fc337d6a171a22ac50d831b4ecc5b3e0ece1c147db224728e0107261333ce"}, 0x48, r5) waitid(0x2, r2, &(0x7f0000000080), 0x6000000d, 0x0) [ 2296.004741] audit: type=1326 audit(1705351184.057:922): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17623 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2296.011708] audit: type=1326 audit(1705351184.300:923): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17753 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:39:44 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x8cffffff00000000) 20:39:44 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x1000000, &(0x7f0000000080)) [ 2296.248809] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:40:00 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xa1ffffff00000000) 20:40:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x2000000, &(0x7f0000000080)) 20:40:00 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:40:00 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x244, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x12c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:40:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r0, 0x80000001) keyctl$set_timeout(0xf, r0, 0xd6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x96, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x480) r1 = fork() sched_setattr(r1, &(0x7f0000000100)={0x38, 0x5, 0x46, 0x6, 0x3ff, 0x3, 0x9, 0x1, 0x0, 0x8000}, 0x0) keyctl$invalidate(0x15, 0x0) setgid(0x0) keyctl$chown(0x4, r0, 0xee01, 0x0) r2 = getpgrp(0xffffffffffffffff) statx(0xffffffffffffffff, 0x0, 0x100, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffff9c, &(0x7f00000003c0)='./file1\x00', r3, r4, 0x1000) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) statx(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x100, 0x800, &(0x7f00000002c0)) sched_setattr(r1, &(0x7f0000000000)={0x38, 0x1, 0x0, 0x600, 0xffffffff, 0x9, 0xffff, 0x2, 0x3b16, 0x8b0d}, 0x0) r5 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000001180), &(0x7f0000001300)={'fscrypt:', @desc2}, &(0x7f0000001340)={0x0, "9efd48cf39d5722d2525343efebd8efe723aed05f0ffafa2734185fda322e061c85fc337d6a171a22ac50d831b4ecc5b3e0ece1c147db224728e0107261333ce"}, 0x48, r5) waitid(0x2, r2, &(0x7f0000000080), 0x6000000d, 0x0) 20:40:00 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 4) 20:40:00 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:40:00 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2312.334353] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2312.344817] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2312.354455] kauditd_printk_skb: 17 callbacks suppressed [ 2312.354467] audit: type=1326 audit(1705351200.660:941): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.361475] audit: type=1326 audit(1705351200.660:942): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.372188] audit: type=1326 audit(1705351200.666:943): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:40:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x100000000000000, &(0x7f0000000080)) [ 2312.381635] audit: type=1326 audit(1705351200.667:944): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.389875] audit: type=1326 audit(1705351200.667:945): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.398968] audit: type=1326 audit(1705351200.667:946): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.403807] audit: type=1326 audit(1705351200.672:947): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.409074] audit: type=1326 audit(1705351200.678:948): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.413984] audit: type=1326 audit(1705351200.678:949): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2312.419246] audit: type=1326 audit(1705351200.678:950): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=17886 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:40:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x200000000000000, &(0x7f0000000080)) 20:40:00 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xf4ffffff00000000) [ 2312.464039] FAULT_INJECTION: forcing a failure. [ 2312.464039] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.466464] CPU: 1 PID: 17907 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2312.467870] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2312.469576] Call Trace: [ 2312.470134] dump_stack+0x107/0x167 [ 2312.470894] should_fail.cold+0x5/0xa [ 2312.471677] ? create_object.isra.0+0x3a/0xa20 [ 2312.472607] should_failslab+0x5/0x20 [ 2312.473387] kmem_cache_alloc+0x5b/0x310 [ 2312.474259] create_object.isra.0+0x3a/0xa20 [ 2312.475164] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2312.476208] __kmalloc+0x16e/0x390 [ 2312.476948] alloc_pipe_info+0x1e5/0x590 [ 2312.477783] splice_direct_to_actor+0x774/0x980 [ 2312.478744] ? _cond_resched+0x12/0x80 [ 2312.479557] ? inode_security+0x107/0x140 [ 2312.480407] ? pipe_to_sendpage+0x380/0x380 [ 2312.481296] ? selinux_file_permission+0x92/0x520 [ 2312.482348] ? do_splice_to+0x160/0x160 [ 2312.483155] ? security_file_permission+0x24e/0x570 [ 2312.484179] do_splice_direct+0x1c4/0x290 [ 2312.485020] ? splice_direct_to_actor+0x980/0x980 [ 2312.485992] ? selinux_file_permission+0x92/0x520 [ 2312.486989] ? security_file_permission+0x24e/0x570 [ 2312.488017] do_sendfile+0x553/0x1090 [ 2312.488807] ? do_pwritev+0x270/0x270 [ 2312.489583] ? wait_for_completion_io+0x270/0x270 [ 2312.490586] ? rcu_read_lock_any_held+0x75/0xa0 [ 2312.491524] ? vfs_write+0x354/0xa70 [ 2312.492288] __x64_sys_sendfile64+0x1d1/0x210 [ 2312.493193] ? __ia32_sys_sendfile+0x220/0x220 [ 2312.494163] do_syscall_64+0x33/0x40 [ 2312.494916] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2312.495971] RIP: 0033:0x7f85f7bb8b19 [ 2312.496728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2312.500492] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2312.502053] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2312.503534] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2312.504991] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2312.506461] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2312.507909] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 20:40:00 executing program 6: keyctl$chown(0x4, 0x0, 0xee01, 0xee00) add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000200), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000000)=@keyring={'key_or_keyring:', 0x0, 0xa}) r1 = add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @auto=[0x32, 0x31, 0x62, 0x39, 0x64, 0x39, 0x32, 0x65, 0x39, 0x64, 0x31, 0x66, 0x37, 0x63, 0x32, 0x34]}, &(0x7f0000000100)={0x0, "fa92d0e52f86277257ecdf8f6de7c6cf79baebc0cfee1b3b6ea5cf82bc949509d9c4c51d4fbb35afd2494a9b857e8dcfe9f67b43ceff2f6bf1f3f7979727fe43", 0x3f}, 0x48, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x2800, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') r2 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x15, r2, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:40:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x206, 0x0, 0x4, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) [ 2312.751619] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:40:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000140)={0x9, &(0x7f00000000c0)=[{0x3ff}, {0x9, 0xff, 0x20, 0x7}, {0x20, 0x7, 0xfc, 0xffff0001}, {0x100, 0x1f, 0x6, 0x80}, {0x1654, 0x9, 0x1f, 0x101}, {0x1, 0x3e, 0x0, 0x9}, {0x8, 0x0, 0x4, 0x6}, {0x8, 0x20, 0x4, 0x2}, {0x9, 0x37, 0x9a, 0x6}]}) 20:40:01 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:40:01 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x24c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:40:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xf6ffffff00000000) [ 2313.051107] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:40:01 executing program 1: io_setup(0x5, &(0x7f0000000700)=0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') io_submit(r0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) io_submit(r0, 0x3, &(0x7f0000001380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0xb63b, 0xffffffffffffffff, &(0x7f00000001c0)="d4c0d332a8f1ce48a2387326a426b034eeb2125fdc54554245d62ecfd284873e168461c2126885ca4b2ed99c671b795aa8e382ecd377990a7b0e59b5df5b8008ecaf3e148677bbdfa450bb2d34644e6fa11bc0ac96d35e7b15dc215bd346beeead6ce57d5ff0438355af3efd7e818a442dc9a3c8387d2efa38118f553ad934bbc73fde", 0x83, 0x3, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0xfbff, r2, &(0x7f00000002c0)="936d3e5d121f3e0e5c140f363d796865073d59bfd77a55a4796fa5e04c6ec4d47127b1f3be56f964a4a54e", 0x2b, 0x4f4}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x7, 0x800, 0xffffffffffffffff, &(0x7f0000000340)="a25d7e895e05e5d93b9b4536186341c5df9c14d2198d3bbe59670edbf7645ce9cd3de8bcfe5b6a0ea8597a537dadfd1ab5e14928ec6020b39f5bd1d6c68f0a1facfacb2763b09d9b4d2c1d55f0a781c0d566f002bb0eeda99499fe3ac951187c5afdbaa011bf57a4c5ac744fb3f8c0ef0cb38a1f0841cfd92017da1fea66bf09d07df6222ec4d68a9e8f00f7629409f3da3df427c1348bd7a9a86a02c876f058065d1a73b01e1e28b2d93b7b66fae8e44301fb7203f10780e1f202fee7219cf3eb50182a3b8d932a439abad94e4dd3465a2c7faebd14c16edddedc65f9a9bb2012731f76c1276222032e22de50acd16b1e40e6f27932e3591e67d95fe35eae2eddf4a6508290629a948b54cdb2e7474b68fc22b093e4066d8cbb488bc4705dd87f1f80b78a294ac42b8eb83ce178908613ccd60e8ba7d5c953f8855a3e941811c41216e0fb0636ad1cf878d66bcfdab9f88ca74847351f4a50cfe8b37af5e805b2e9f35b369011a40fba7f7f83939ca99d8e84561c39d8f5246b6891ba2dedac3fff45687132eb4ef62b1aaeed4072bd9cd429b428fb76f80a595386e0350a2cb566efd2d7a9646c62cc4e89438ec1dfa1f9b03f0e798894e7f298b3174bf8aae3d1c815778d62cb2c15bb93032c9ed6ab577b605f575205f309e6be053526ba8c6b93957eeb8dce33bfe809ee10e0230e1ea471bd2f7bd562bad7f6a15664cd9c6a487274458b5c2a556f7b5a3ba2d488dc1f3abec0ee75b9d29ab1e1c21e84c4d06229edeca3dee7e160c1fa6951a94644f4f2de3b1d081a25f35ce13051f005e64af5f7b779caec4563c8978f8ec0c863d0c2249fd7646fb137af2171497c167615054d2d0e5be595050117bbbbc8a2c6bb0de9724e6a0c1e9577e3e07d69e7854a82b28647804f9ebfe53eb748a38e882831c891e58baac702e03ef85f1eb868fb8c64c597c42527ae442d62f6e093a569abe0c552f906610718da5b0a1bdc5b9ac2fe651e4d415c414cabd83b045d6df1d157476682e20735a5f9c3366e53a17aaa2536e1f194f40049530f2901f8819355c909c236769dc2b17fde68e78128915490dc582eae9e353df08a3ba7cf97dc4b637bc66c4e2d53569cf72e8d25a0065bc751eb310f74ace9ffb50978b0447f1f3daf5a81bcc447596bb689641d65bab61a415e21373c034309b39b6f30ecd8c328da109731c5a5462745be6cb46eb45253873a6bf0c47eea9768bdb1793826a9ea549a9a172e21c97174943ae8237e463634367af8c45a77ef74669136bd94d629884f9b78d5f8fe7957c80cb5a4692338ff3e0183229e6eaf19b158ab60b043c1840fe7930edb28391667a8c98601a03cf26962b385e08bac7705a8aa60b2b7fbd75b42b9a9eefc7999857a03a2d6630343965daefcb523e56c80d2437d56a2a59b2feb4ae77be17e5d3cdf68e8546afe2e762503c526053f41be0ae03268a0ce1870402047514d89e8351f7997ad54d8c646f2820ac057833bcddae5a10166b21a57de3bf633b11f257095e344d9fd0bca7d8e40a4ce35694bda9882c1d777e59516c1db0e33a59a6d8038da785e4c09b4373beca141ff81c91a4748d4a9721341fcf43e8a7660acb5ec8182db6114958e32827c77f01c33c31eda7fdc155d81533c519fec213ba840646c7780b38c8ea2523ce1dc9e908e0818916f86678dc31063aeb3bbd2bfdff895c8cec066fe70d0e0f57d990ff3e4f4de0a6e8493eb128a5c758149fdc46b2ae1ec2df5e3653e4257abe1788e2db3c23c13032cd49ef4e9ce4125b0ddf41b458a393b3f09bb673c605413f82ba943743ecf85d194352f51277c870ade01614a5d9a667bf46706ec65b29d6293fc25c4ed938d6b69059c3f4829f9b7afba1ab9a9217b5f4b269c930bebd33b3f86c1492768177699a307ce01f42b03554e14d2325cc1141667533ec4c55f114b2330d5144fd0b7c4c2c8d020866940f8def6b0573fe84e2f70c4fe720c69eb737515b52e9dc501fb9fc3f00fef46c3d15bd2bd273b3f3993309ee075748ea32f2aef43b094585044db679e3a84018622c5d64c74cd0024d9ba15fd7c537232a56a289daa0f00f56a50520b6bf7239e638167782fc62dedcbca1f49045539dbc1ec38d2bb17a9c2cc0ded8eded081da7708857ccef2b86c500d9e33eb5163c31f8c0dcc9d3599eb82cb3f7724f363ef2165bfab1d07568671d02799b4db0267958b7966f207fb1832f03e612f1f5b8b5e0d96ab3ff13663ce6d49329cf626afda95269b8cec9ed201f1c2cb7f55d34e1dbee4fe288f506be198d27df404b95209948fd2dc138f2ab4e480c47ee50cb05ed50c65f48ee77e0b9c880ec3a3902a977c19c48a3ce0e9b4e28a1bddad039c9d939b864b12e19fff0769417e509415f93aa6ad56a9fc17b179c6b5a15082c148ca976f7c8b0db79c4e8f9eda27254285a48ff094bca1a996ecfb11f1bbdee993521f151e2ceb620a00df858de76e14ba97458653aea3434a4d1e5b9aa3415b17692d9c3f33985c4e5ab040cabfac1f6a05109d0e3e781ffa131d02e19e0d3682fe85a3946cf6ffeaf39b1f6ca28d73e2065a9eb68c8cea71845a830e3525ff2b00b55a521ffddf7e7133960d1097eab812cfd2bf421d0a02c3561773c2a703a4f6dbb1d4c72ca88d692e2220924efff7613322cead60e5a011e9faf97b0e98536adeec6c428e8392bad0e5761b479fac8499f9f981fa5084a8dbd038bd5b40e4b236c2e5069b2c1050759507b0e943225edcc2ee62897b4306d66b35aa53e9630d0dd80a18be127e05b78a7b0061cee4799facbf4c42d179641eb02443671e207c55e6307c0ad1195beb6d1e5aa6525ea9084eb2e42ee701cdf1ef74d4ab3f708d556cc192e83673e92d93d02846718506adde319783dd38b5f9eac4cb45cee44052846a0f6251d90f119a5554d0b2a0ab9c2fb2956161503dff06179040f0f54a7f8a64e37957b490ce5fd94810e7ec63d37172fbe1c9ec6cff11668eea0ff23d8f9ec577af6d18a0f64169d785c690b1c378e76db3af74cde1521683827065b70c502a2434d2b5c7aa9dd5fbe3a423ccd0d1f3685bc174d01cff04d2a7a6ad422fd9eb2fe4c8becdda78c75e6c36d50a4dc2af84d89d1dd31bf5ebdbfe0602075c05513fce6b131584ca70effc5c7ef2dfe9ec994372f7feca366f87b0bfa3f1df933ba7ca4d6e0173e154b46dff9a3940df221166bfb3a477c81b21f743e5fa2f536194842dee6b0f703f08e9a47a173bab16bea99aaf399fcfe353e98f3b1d7629693e4e202bc853d311ea0ecb737431e6400cb8f93ed5210255333e6305c0c0ba5c9ef76b612fc28cee85a5fb883ad0d2390827c4a4d3ec68021aa328501a0012a50a5830239cacc9d012ad551402db9edd3e96aa8035a2d8e0770d08c5155458e4de6c9da20fec4df4a3f66476bf55c2ddb60fa657104ab9d3fbfb0ea5d92722f0f047da32a76729109cbc5fb87d15ee1c083ae68c14e54e3a6e62102cb1bc218adb2c65074bf53b883adaf66735292bb2b2246e7cfd0f7d457f8850c65dde4c2c7a1dd52cc7e44151b6275d433debd81535f84ef54ad1ac9eaff552b1d0fc26e6be3d760f29397e7905651aa2c1bc1db6ea0fc734c5d7451a93f24cb287ef45c4d4d128a067c41ad04521ce08dbc93676ab10c8854a79781779082f48c85a61624bddd2552a423f5dfb859d0c0d0e729f8a85f939521e37619ac51588dda69165223f9baed266bc90498c292efef831aa28e891e51c86719516e19296678746ad408f70ba92cff82db129adb3614507ee463fbddaa11603de3594ebaef549baa6560ec337256f2302e3e2e772784a991ed2ba334631b8cdb7fbacaf9d481bdb65cb75538783564f26c034f2c2f029a38e3e8aa033e89e0bbf0aaa3fad74865350e785da35279be5792923ac1c972ed1b4883c91a648c7e913f95dd4a07316d608f9feb61cd0c2990b0be5ca5dfe93acaabf5c5b492b1e255a780c6721fec60e5d845522ddb88f473516f0713e9171dcdf0747c8276a9d33a18104c5bfe86e04de41f97ec9f92ccd2d8579a36989a87d72c80a9176ccf25e61553f6b973b606f0723b7746549c25e404a3f402cc489bd4f0fbcefd44da24a0f7ad9c846a528626ff949135939ef985ca3e25406c74dc8526539ce45db95252c6c152e6d731ca1a5e6b2a0ec9d2e058983301c267ec882c2cd1ab397238d723ea50b3301728aefa47703ddd0f3fb89df6550c1b278e6f819fc76f6882a5c37c633c8fa0817480e81fbdc2db01f3693afb66e21ff0237630a5f8ddcea80e06ee17437c88544b91fc2fc626f380d72d886cf581551b66132df43e08acb011ffd076d1c127c19201e88d72564a73f67a760346e739d4a2a79c081f2d11fed35d5c6bd66b7ce1cde9e56fddc73900cabefeac9de4803abc0843ad690efc89ba5cb7d22d72a7366af8e3cb03f1abab04b6c63c66fe12d5459175a16ebeb393c8eddf13297f1c81c0a4d9220385c569868728f3148e2a30fdb9f0e7fc1ce5ed3b1071264d32a1c6129b01330388ef8881bf221b209223c7ce6bb2b2bdfecf20bd48fa04f98b9f9cd0f2da40269c986fde01ebbcbce3a32faa434188c08e8f9566490a0c0f7e62839bf9339a96d308858228ae9efe17c5b4d1e3655c0b8b6cfc72314c843a11d1748bdddba1923c4025aa4e251c35baa40cfddd8f27c30a8a1f1da29d3327ef65d6d91c7fe5496680e225045be3c5fdf02a6bcae5c1377584c454b26b10a741ce8249e7a61455c28f9bad3affee969834efdee9326938e82bc57f5bee8479e7fbc1a82c97e388dacc08b34b0d762ed342907125a4e980b8945d9d6a5e46f2e90e0f462b69caf38c9a4c983c3f3e1a4d68339f8e955d9e85fc7f3cc0af394f708ca1214b9e008fe8ac88aa0de8c8b083cb4c5de9b791ec1ae5bebe77c47601da05e9deceddfe39f4435b56914dadf8fc57e828a5f3d61f13d162847f099949315df5b5d132d62a06121e9efc1348215feae750111f87277b30c1d7d4ef6fe1e4ff078eec41c0860a554fecdad98f960c89bdfcb80abd5ccbae890cce3885df75d1dcbbf814ff55a009b9c7aba8e24f4306f4466abc4754b1f926a5a1679863668f64bb43daa3841287883d9fbdc1f2c731f1f88a9d9ee2247a9d928b42336b2eec7081db18f8802c7902e2f7c8e415def361e4d610c5fc359aedf883c1df475694d49259b3173fcb3c9ad8036d953e3cbdb0a6e23388f8157b6d99e49815a9973f361d84fe7314d786b73e3b6d3d2ddfbb48b964f9070f8c6266d561d0163b57ba263541a4cb8387c5fa6574a43b7414af4b8b44603cbced980c3925b4772d158e188d01d8075be47d67f9ad722e2773625bbfa6b93ef31fe34d3f1012607ad315fd72615413101703b27109f00ff215acbd7341aeffcf453b0298e6dfd31b35995ab0d7082149e53b7c9ae88ae57982957c100d80e57de5357002c1a7b860b1c6a2ed79f5432a5d478b5f443065a0392b515810afd62ef10f09c97a13e7e3d43bcdcfd42c3fcb324a14dbc7a787fe1f3bea5e00f2ebf30a3b96b5802af0d37bb5dc8e54cb6a3c7d17bfe2547787dd3780f0af881aea9cb49f814d431414e6fcbef7984cf6994b77b128a899d33ebdee770e1f4fee275b409d06132cbfe71529915365414881d1db8515a1e2d80ee98df82b5bea2b358427e55354b3cba7147213f576e50f63c9472a20487863deb485492da7225f669d4863ba2898d6c19ea41493a75da7492", 0x1000, 0x6, 0x0, 0x2}]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3e2bce3, 0x40000) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x0, 0x2710}, {r4, r5/1000+10000}}) 20:40:01 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfbffffff00000000) [ 2313.268241] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:40:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x3) creat(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, 0x0, 0x0) 20:40:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000000c0)) getitimer(0x0, &(0x7f0000000080)) 20:40:17 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 5) 20:40:17 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x24c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:40:17 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:40:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0xf000, 0x3, 0xc1, 0x9}, {0x2, 0x9, 0x8, 0x2}]}, 0x10) getitimer(0x0, &(0x7f0000000080)) 20:40:17 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="640000001e0075b90000000000000000fe8000000000000000000000000000000000000000000000ff0200000000000000000000000000010000000000000000240009000000000000000000000000000000000030b9936701da6800000100"/107], 0x64}}, 0x0) 20:40:17 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfeffffff00000000) 20:40:17 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:40:17 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2329.535802] kauditd_printk_skb: 27 callbacks suppressed [ 2329.535815] audit: type=1326 audit(1705351217.841:978): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.539396] audit: type=1326 audit(1705351217.842:979): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.544336] audit: type=1326 audit(1705351217.846:980): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.550013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2329.550582] audit: type=1326 audit(1705351217.846:981): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.572585] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2329.602361] audit: type=1326 audit(1705351217.846:982): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.608558] audit: type=1326 audit(1705351217.850:983): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.615031] audit: type=1326 audit(1705351217.850:984): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:40:17 executing program 1: ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000000c0)=0x7f, 0x4) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000006300), 0x800, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x89f7, &(0x7f00000063c0)={'ip6tnl0\x00', &(0x7f0000006340)={'syztnl2\x00', r0, 0x2f, 0xd3, 0xfb, 0x7, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, 0x8000, 0x101, 0x9}}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x80000003}]}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x442b, 0x11}}, './file0\x00'}) r4 = socket(0x26, 0x5, 0x200) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r4) getitimer(0x0, &(0x7f0000000080)) [ 2329.620437] audit: type=1326 audit(1705351217.853:985): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.625493] audit: type=1326 audit(1705351217.861:986): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2329.630079] audit: type=1326 audit(1705351217.861:987): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18152 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:40:17 executing program 6: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000180)=[{0x6}, {0x5, 0x7, 0x3, 0xeac3}]}) gettid() timer_create(0x0, 0x0, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{}, {0x0, 0x989680}}, 0x0) 20:40:17 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xff00000000000000) [ 2329.681968] FAULT_INJECTION: forcing a failure. [ 2329.681968] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2329.683882] CPU: 1 PID: 18171 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2329.684686] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2329.685634] Call Trace: [ 2329.685942] dump_stack+0x107/0x167 [ 2329.686383] should_fail.cold+0x5/0xa [ 2329.686838] __alloc_pages_nodemask+0x182/0x600 [ 2329.687381] ? xa_load+0x12d/0x2c0 [ 2329.687798] ? lock_downgrade+0x6d0/0x6d0 [ 2329.688274] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2329.688983] alloc_pages_current+0x187/0x280 [ 2329.689493] __page_cache_alloc+0x2d2/0x360 [ 2329.690005] page_cache_ra_unbounded+0x207/0x6f0 [ 2329.690578] ? read_pages+0xbc0/0xbc0 [ 2329.691019] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2329.691568] ? __is_insn_slot_addr+0x14c/0x290 [ 2329.692108] ondemand_readahead+0x8e5/0x1150 [ 2329.692644] page_cache_sync_ra+0x138/0x170 [ 2329.693151] generic_file_buffered_read+0xc8e/0x2920 [ 2329.693749] ? stack_trace_save+0x8c/0xc0 [ 2329.694248] ? alloc_pipe_info+0x1e5/0x590 [ 2329.694755] ? pagecache_get_page+0xc80/0xc80 [ 2329.695285] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2329.695846] generic_file_read_iter+0x33f/0x490 [ 2329.696378] ? __fsnotify_parent+0x488/0x9d0 [ 2329.696902] ? iov_iter_pipe+0xf1/0x2a0 [ 2329.697385] generic_file_splice_read+0x455/0x6d0 [ 2329.697958] ? pipe_to_user+0x170/0x170 [ 2329.698454] ? _cond_resched+0x12/0x80 [ 2329.698920] ? avc_policy_seqno+0x9/0x70 [ 2329.699401] ? selinux_file_permission+0x92/0x520 [ 2329.699953] ? lockdep_init_map_type+0x2c7/0x780 [ 2329.700516] ? pipe_to_user+0x170/0x170 [ 2329.700994] do_splice_to+0x10e/0x160 [ 2329.701451] splice_direct_to_actor+0x2fe/0x980 [ 2329.702006] ? pipe_to_sendpage+0x380/0x380 [ 2329.702531] ? do_splice_to+0x160/0x160 [ 2329.703007] ? security_file_permission+0x24e/0x570 [ 2329.703611] do_splice_direct+0x1c4/0x290 [ 2329.704100] ? splice_direct_to_actor+0x980/0x980 [ 2329.704676] ? selinux_file_permission+0x92/0x520 [ 2329.705246] ? security_file_permission+0x24e/0x570 [ 2329.705851] do_sendfile+0x553/0x1090 [ 2329.706331] ? do_pwritev+0x270/0x270 [ 2329.706792] ? wait_for_completion_io+0x270/0x270 [ 2329.707371] ? rcu_read_lock_any_held+0x75/0xa0 [ 2329.707927] ? vfs_write+0x354/0xa70 [ 2329.708375] __x64_sys_sendfile64+0x1d1/0x210 [ 2329.708920] ? __ia32_sys_sendfile+0x220/0x220 [ 2329.709482] do_syscall_64+0x33/0x40 [ 2329.709931] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2329.710559] RIP: 0033:0x7f85f7bb8b19 [ 2329.710997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2329.713162] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2329.714055] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2329.714898] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2329.715746] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2329.716594] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2329.717430] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 20:40:18 executing program 6: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0xb50d828dfb9c3636) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) r2 = getpgrp(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x101, 0x0, r2}) r3 = dup2(r0, r1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0x4, 0xde, 0x0, 0x0, 0x7fff, r2}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f0000000140)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x30, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa, 0x2, {0x0, 0x2}}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_QTHRESH={0x8}]}, 0x30}}, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYRES64], 0x20}, 0x1, 0x0, 0x0, 0x20004800}, 0x24048011) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) [ 2329.863988] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:40:36 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:40:36 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xff01000000000000) 20:40:36 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 6) [ 2347.806256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2347.860347] kauditd_printk_skb: 11 callbacks suppressed [ 2347.860366] audit: type=1326 audit(1705351236.166:999): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2347.866914] audit: type=1326 audit(1705351236.166:1000): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2347.878951] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:40:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x24c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x134, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe8, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x24c}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:40:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000001e00)="3cd52ed97c9e213909d730166b17123f3294a3353d43c2bda33f8b46124feb3e574cb78ff55dae93c1d80f8b1b571caa5d0f953fdc20af7c2907f40c853111e5a4a6405dfd6510e2573f0cd5a14f722a746315bf5955d6443a167b62e37e70e67059a451add17b0ba3a4967e37a184c25fd56c25f32d2c08713830771e190d3e72e360fbae6eb7f69da7ae1b7575584eb3aad405c2e0cecf7c57c725e35199b38412b21fb229249cb5214590ea9c200b689ed99433fbbb389404f04d726fe19ef657f8896380c769f15ede2ebc816773d5730db7acb1828fbcdffc4da713e0944bca7028c47238c1aace7879fca945a836e4ff365b155de4a6b5e69df15c57c8c84a27359b026401b2d2ebb22fc4727115b803cbed672e1c10421e53aecb9848432f39231a6fe45af05a49d7f66593d188b01763da10fbe076c0103b005492008157072857ecefae4dfd561229bd8ecf19e938d25a4315e343c5ffc67c1810af17fff3e930e390dc021b8a020e9ad5750cbdb6ac2406d580f35c6776feba23704f457eb3c9e481a38ae02519b5561493b3a5a22682f0622f55b91bf3fe3b6eeb0b411767b39cf41b6ea7f7606bbbf59f038ed99313e9185bafa0f1fb0d7f8f854025afe6eb498d49d00f869ed3d4abccfb90d70f1dd88a92a1f6c2a1f62238ff8733e3b25225fe919598664429606c6ba859544fe0de3a9f18ed8fdd5e9ce15ab80c870a454b550e5fe805396bf4ed72b627314fad05b74a500135c9bb1b297b170356d42c9983c3275dc8c95a5a198f3b896c712d4c44d66ee10f29d4d71df5484c473cdcd107d66ded8e5219a066b00f45faca7ccbde009031f583819cffcba547c3b5707c7c1eba73dc6ade8f584244ba35302df2a0341c8e629d52fad82cc1c34dac09d39a975902e883ce1b648080e5855ad37961abaa7eecab4ac63cb839f4039f8b93d2ba6e618ebc437166e24e210171bc8ae12f31e90adadfdba265f9a8df86648ff4bcff451f289c9142ef5bac4ba3131852ff820087a5b7e1131eb05c8c857dd4cf2839501138174f70eca95c39a59220f47be95cbe4996c214f17e5a790679057bf0c05e7d79797fa74af891a0bb050183e9124f3677a94c92e3caaeb095d0746fa8a82e30f14b228fffee24ba0385ae2940a223aa6fdd3bee655aabb131e4660eefa4e65a0cd2197f54d94783a2513ab6ae8c548b7fae70692ffa367a95cde0cd90d37be42547f30d1583a913b11c9f998d60d8c78a3677d79c717dde50a0124d918e66655902e6cb60ddd82727bc05b31057693ee9d7601be6d8870edc47c328afa800911568d99655a271c65de3a07616806e280bd453217ee2420b32544c67e34bbcec1874b450af23af54048d3a10e71967bc1ee3c0029235d95f158895bbdddfa81a3cfbcc74c7c352820f75e00324e154441074853b7c2dc1c3ed42873c6323e0bd29058b62187f57ee8def92612a91b1598af90904e770a8788c05934b54f998ed0a4b54198e74a1bdcd6e5a07109f6bd0271384211633d2d70c28843fbed80968d3cf49a697bfaffb92101e0626dc34c4b9a8b47438606152c9eea6481597918ef7739be21f562c86289b842b1d9208459f41716f2518da7d3f4ba062c0ea28a221e44f071325deef0c9ce5e8bb729e8f393020db13ad241503f9c4dc21fee5bc58893e112a2bd2528aa825c3b8e19d8312b268a43c9c662737da60bf318a5cd9069a2d96653818733825f5808371ad593f124ce11272705b5dd827d269ea01ea8a3948418278ba34338fea40665bcb5365033785adbbc7f20ea2489a728670108781da688a9d2f327f7723b76e4d2dba9c05a8f15bc05fdd521ce44e606fb0daf61c3cf96094bc4c8ca55892cd55803da5ec5f72c9ea01273ba23d834061b1a4e7778470cb726d78692d1d00291b9753fe96e43b24f239b575978b0fc6855aae3e384fff6dca011d58ca718f5a64ce083744057fadce07c1569c0a2dd34cc2f990c2d0705d4ad2dd03ed74e005e495987f5dd3b561bfd610d372abd48da2cdaa6253b074b55a30c7663daf7268768a656ac8f36d0c61a6671f6b75b69634c5c3cb06bf7d28e5b01743d673ed200a51e70f7d72c908e21769144a72870fead7075c25ddadbfeb9a9818638c3829d329eac2eb542f190986977bf6b79ae967ede1bc3e998d271f8225d5ae195e1be0ae7be5dba2584bcda86187ccde07022a3a462f505557140b14646b8d2ccb67c82bcfbeb71ece2f3af3d2d522613571766fbc39716026361c6d109d1ca6616495a5c1186cb2009e8d365abaf16a81230ad8c05889f9fcbb7ce0c6a507f9b5a078dfe5a7483d376f16428d23eb15c688f252d8548b5d94f34f8cd430b1a31bcc3e1ce90d14e3e7a33021df06882d32b90e4c6968c8046a7410bb6920f278d1b1c166875217c8e8d417adf9b50c85c509fa0581d906ab12c339e7ce03a49693489e7965043c75e5950363f062e43933d848ac73cb5f8585eee7d22305f9332df9ad7a11377c01f15ae3009d92dc3fae370f8f817400fd7f5aeb5b103fa1ba707b86ebff9324e2d52a8d46baff356e4be977bab515127107916440e1867c4d6279b08479597b3268c98566723c935f96b569b2b60807f8a046ea6e2761c062c7913dc9d4bf71f60ee2fd0e7bb3e5b718e8d4a62c43f2d53d9ecdbfb6d1dea8d8ce51c574c5007a55bd1a5933e3895659255153d501e3419ecb2c63cf337b7de31b0830f7c5b4fe267ef576c7776d34e47c7ee204609284af5a10a88b0d2488574d50614b004c04285cadc63001ac023f570b6fa4c0a21635b2d53405c4279ce02ad7033cc5df8559e1cafb3e6b0dd169df0a980a27d5acd32f68e166ddd6c43e186de12bd09f14e644c5f7a696b1cec0cfc757dc64e8f0b64c8bab66db414fa724c175fa49676d0ae100537b7cb55751a54149b60653a20bbbdaa58a9172228e553a5ec93387db79eaa9cd542cf8035d4c50b7e09e3728f153641e7fd5c9cb8969df5374a25d3611aacc81ea1d195a4b2f7e1f861259fe1d2d6422e32acd44d2f996508c07e54b200a472e4782b0e5aa030898f4c51b578f60d17fc5c01055be225120118c20b171d8bffe38f194b0ef598ac5696825da3442eb0513e31dcf997a213ffb711392223c906b637c77a5ac612611b9d4f949bfa43d746b38fa61a2b736f116edfeda864cf56357f0d9ed25d27cb057c8227379a86d9f2bf00f289ea8fcf4a61f0bbc50045047e7ef0b097e4c65d749f4d40a89f6ff2e17990e837f81364faaf32cd0c5cdf9846173610759a22a424e00f57a3143c8cf561f12489ff01fa64ef27c39370e1eca076ecaa6fbd701ad2a29b80cca60bdccd34e5f26fd0ac661ef5da02883d55401b05b15770399f960c8749fdc90fc06ddc18bd88ad6d21a7db3aaf52e28ab741f211898192d4ab34b659e79eddd844a28b5c3d0125f5b8781f270f7832114c744bc5820a60b28d408291884c0f85b47e660f8545c412c235e85da5e33bd315067b9f89a36b76e204e82ee465031f0fc463d42254f73fe269bd7ba4f4f06dafe7057f58f5387f40b0bf3fa2e9ca6b2afc496d26ebd092e0373750cc649f16e1e35179825f3a51d8b015539a4ba1661addc540c776257ceadb0d795f8fd6737bc302fc39b4dda8bf0db0f4d0a62839b02ff488810413131a566082d864e5bfc3e073a63f17b28aa8929cd239f50689fef85a8de3308be69b82d7eca3d9e5190586362841d1ff6c562a3c6d74e57750e80baddf2aabd9cc40ff3aa30e2a9be9150815977e3292f171cd184074d00e90251ffb0943b276e67a87d7eed7af3d886519f54aec72d5eb01268202999e8d78532461a8524aa0fea7c49aa864f956bc4dd31047a529f8bbf4ba971ded87c6121533491863d6d2f4dbeac566839675a781f43c9ed27d0527c961a60f212deafd75ac331674b4e76d9151c9813aca07565b1e8b52a835d1693f36cdb9be6fa8cdd7431183467be6dc75c867268cbc7f7a6cd1059ccb123c47de06785d1deb8a2a4ab286929253e05107d07c80d2790af78fe59f022763514ade2fd2f2aa0fff6c99c6af7498c9024259f2f49d8e0f054b9e7d774b4e7b1552340012153d4c79451be6ffc71079da12c140d97f3a813256e93e22e3ff9045fc6075df39fab13ed8661a6a06bc083194ebe6bc40040840f08cd586d7a3a36fe7015d3a636f94553955325eeb3d5c538251202c6c1521cbe2b87e3a22ffd2744094a44be4a63e09271a29fbddc042872a53dfe54670d0028d640754c2aa06ab7e299244bcf5517eca5a0d50799ff872bdafe888a587633f3771c161c520e56764ae13e351dd4a4fbbc4c12e00986c58a3af279473acfa42cdd442d2ab36a1f2c8e15df74b9b9fdb7f4ed0a527e1b2522ea18b822d420e493a114031ef87dad32101c7002f7aacd435e3c952c5edf7f6317215709f673926e15feb3021c3d31adaf27f468ed93f65201963ce3ec173f8003d417961a503bfe5181ed3397bfe1299107235aa1562baf276ddc6b3e802a35042d0f8a79ee06102c8e9b0a92e7e92da2788c8e6450a924fe8d7637a183f9a0b69e949ee3d54bd5abf9b6a90bd3cb8a9bc9d8d91418c72b3fe665d54dec99eb53fcf474a0f42171e2f3fb16a00633408f77c205a168f70379d5f10988510ed2605f1811c5c22d9e3e44f483cfc65e373e431eb224414db926be369c40fd1e40f2938cc484b33f69d8ee518c33a91284d6e3635720b731c68011d6b467219a6deb3b6c47ae211375d738b6f77a4f6ea2b80579aa34b3d0bced65466b6946f386482db484af971f33f546f2c0b0bcf6135784fcf3f0f1006fe34617e86adbabf80935995d34b48b9d1f12ef089510dbbd616a59e875d3f3e0aa7aea1758d6c5f2a699d031823205a4ad815efee17395d817015c392a79e4d0ac9686e596220b0ecdd2c1646e54a5630cd6022b1f52d81de0b7c0e772ab6a9c931bf527b0a874f79fa860cc82283d36be2114a4ce514b60f2b1ef941fb4e1a8d2899467d6231f82fefa3bc2462677ffd1d2436b44bf4f7fe734064f0a0b16c3f16332a85895ff84494009e00440ff7940096065996741278b3652d6286545b10c77ab2e905c1bb8c2d538ca6521df0707f55e0054d2d87d060f863c9cc50db915ac404ff6017a48a04190d12168a647d803819879c0bc3e688663d1585493dc800727fb4775473005d0cc37c3941dddb31071cb5389083a0ee8aa5317326c7f8a29646e24bb32c6d6198d2e095a6694f5ad98e3940608d60e169cc7dc507564e043aebdde61d7adf96f0a52adbde8f9ce5f99a323c8cfbb35c23baef865a6a6f949b9ee425ed2dbf1f74eda38aea9bb1e814f8de792d106ffc2030223aed765a49a8c5225f986508d023b698226c40e366e93264fbf51c2fa8a889f13ef4b768c480ae4ef3d5f061d7cd2ea2456e0c2bca80c3e7b23209a4d221a1df8cc6b3e5fa6dead523253952380abf2ca49d628a4078e4c34c49caa2f84dbd9325c2459dcf8ffe65163a438dc1f204cfeca634cfd0a2f0f165539b88bbff3b4136f21cd050ea0c2959701aed2f44be88498bd6ccad2935aa459f91e146928eceef45a9dee8ac5d9ecedf6f3757a3058742aa743b74020dfbd925deacc4fc4c1e1d91653f93b190229888c5103c29a4b5ffc836babd2035e79d5742e32f663fa44ad2ccb40e547037ecfc1d8f1cf1f70638302c6b8e8524ffe1e1b33464ae0c4ad2b8f53350998a864ac84789fd0f48534295285e6", 0x1000, 0x5, &(0x7f0000000000)={0x0, 0x3938700}) [ 2347.881809] audit: type=1326 audit(1705351236.166:1001): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {r3}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000100)={r3, 0x1000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052900)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x81, "d5e2b485aca084"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000052a40)={0x1932, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "4abc261bc0e3cc"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055940)={0xffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x40, "5361a567f041f8"}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000005c0)={r3, 0x20}) getitimer(0x1, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x7, 0x80, 0x7f, 0x21, 0xff, 0xff, 0x0, 0x97ea, 0x13261, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x1, 0x100}, 0x1, 0x2, 0x0, 0x9, 0x8, 0x2, 0x142, 0x0, 0xfffffffd, 0x0, 0xadb}, r9, 0x5, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000540)={0x320880, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240)=0x0, {0x8}, &(0x7f0000000280)=""/244, 0xf4, &(0x7f0000000380)=""/239, &(0x7f0000000500)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) perf_event_open(0x0, r11, 0x3, r10, 0x9) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x9, 0x7, 0x1, 0x0, 0x7, 0x10000, 0x1a, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x1, 0x7ff}, 0x45408, 0x0, 0x100, 0x1, 0x8001, 0xffff, 0x81, 0x0, 0x8, 0x0, 0x700000000000000}, r11, 0x2, 0xffffffffffffffff, 0x12) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x77359400}}) 20:40:36 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00607e636c2c000b4c0aac1f802b3d51a24b8f9eaeb8a904b8baf58a684e42dab4813263ffd51984d70d3b09283c807a575b6763d0a5df60909cc68452f8effb0772b50db105812e24670402e7c24828593b4b768725e04395b180e2e6b48fb864f03e0a89961cf3a70282d3663cf875c739734c0d68d5aeae4a5dbc39cd04413530ae80eb792840d745833fb9b4bb6219c37b10f5981254d899f1afd9ed4ad4366f2554a70e373310387554cab3a7ce2e6dd1ae6cc3e9f9d4734f71a8c74b2729e1640280413d3ab12f22d82b5d349667b93ae39c28dd2c8c24be7dd2a61014227086f8d7e14b761c2c04084048d1c69398b04351c07eb716432c0473c6861b7eba8634f4e20603ec9d26cddcc1752576eb19d3ff98ab160c2f2a476aff2983eaa9ab706016da8f96"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:40:36 executing program 6: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_io_uring_setup(0x3153, &(0x7f0000000140), &(0x7f0000fef000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x42000, 0x0) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/1850], 0x73d) 20:40:36 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2347.898541] FAULT_INJECTION: forcing a failure. [ 2347.898541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2347.901820] CPU: 0 PID: 18312 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2347.903235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2347.904999] Call Trace: [ 2347.905554] dump_stack+0x107/0x167 [ 2347.906333] should_fail.cold+0x5/0xa [ 2347.907163] __alloc_pages_nodemask+0x182/0x600 [ 2347.908149] ? xa_load+0x12d/0x2c0 [ 2347.908908] ? lock_downgrade+0x6d0/0x6d0 [ 2347.909797] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2347.911107] alloc_pages_current+0x187/0x280 [ 2347.912074] __page_cache_alloc+0x2d2/0x360 [ 2347.912997] page_cache_ra_unbounded+0x207/0x6f0 [ 2347.914036] ? read_pages+0xbc0/0xbc0 [ 2347.914851] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2347.915883] ? __is_insn_slot_addr+0x14c/0x290 [ 2347.916858] ondemand_readahead+0x8e5/0x1150 [ 2347.917820] page_cache_sync_ra+0x138/0x170 [ 2347.918749] generic_file_buffered_read+0xc8e/0x2920 [ 2347.919844] ? stack_trace_save+0x8c/0xc0 [ 2347.920726] ? alloc_pipe_info+0x1e5/0x590 [ 2347.921593] ? pagecache_get_page+0xc80/0xc80 [ 2347.922520] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2347.923525] generic_file_read_iter+0x33f/0x490 [ 2347.924489] ? __fsnotify_parent+0x488/0x9d0 [ 2347.925397] ? iov_iter_pipe+0xf1/0x2a0 [ 2347.926229] generic_file_splice_read+0x455/0x6d0 [ 2347.927257] ? pipe_to_user+0x170/0x170 [ 2347.928093] ? _cond_resched+0x12/0x80 [ 2347.928914] ? avc_policy_seqno+0x9/0x70 [ 2347.929748] ? selinux_file_permission+0x92/0x520 [ 2347.930752] ? lockdep_init_map_type+0x2c7/0x780 [ 2347.931733] ? pipe_to_user+0x170/0x170 [ 2347.932537] do_splice_to+0x10e/0x160 [ 2347.933330] splice_direct_to_actor+0x2fe/0x980 [ 2347.934307] ? pipe_to_sendpage+0x380/0x380 [ 2347.935212] ? do_splice_to+0x160/0x160 [ 2347.936044] ? security_file_permission+0x24e/0x570 [ 2347.937096] do_splice_direct+0x1c4/0x290 [ 2347.937941] ? splice_direct_to_actor+0x980/0x980 [ 2347.938955] ? selinux_file_permission+0x92/0x520 [ 2347.939962] ? security_file_permission+0x24e/0x570 [ 2347.941017] do_sendfile+0x553/0x1090 [ 2347.941837] ? do_pwritev+0x270/0x270 [ 2347.942629] ? wait_for_completion_io+0x270/0x270 [ 2347.943623] ? rcu_read_lock_any_held+0x75/0xa0 [ 2347.944587] ? vfs_write+0x354/0xa70 [ 2347.945370] __x64_sys_sendfile64+0x1d1/0x210 [ 2347.946303] ? __ia32_sys_sendfile+0x220/0x220 [ 2347.947287] do_syscall_64+0x33/0x40 [ 2347.948057] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2347.949117] RIP: 0033:0x7f85f7bb8b19 [ 2347.949892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2347.953659] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2347.955214] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2347.956663] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2347.958107] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2347.959575] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2347.961018] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 [ 2347.981926] audit: type=1326 audit(1705351236.167:1002): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2347.995264] audit: type=1326 audit(1705351236.167:1003): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2348.005998] audit: type=1326 audit(1705351236.167:1004): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:40:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x629, 0xe7, 0x0, 0x1}, {0x5, 0x9, 0xe0, 0x48}]}, 0x10) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r0, 0x8040942d, &(0x7f00000000c0)) [ 2348.020711] audit: type=1326 audit(1705351236.179:1005): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2348.036931] audit: type=1326 audit(1705351236.179:1006): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:40:36 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xff0f000000000000) [ 2348.045097] audit: type=1326 audit(1705351236.179:1007): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2348.059526] audit: type=1326 audit(1705351236.179:1008): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18300 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:40:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/bus/input/handlers\x00', 0x0, 0x0) 20:40:36 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffbffff00000000) 20:40:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x164, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2348.274936] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:40:36 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xffffff7f00000000) 20:40:36 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:40:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x3, 0x0, 0x7fffffff}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz0', "16895013be3cb8a5f7955b17920f6d8136adc4c46e3685ab614921c4cd556a7783e4cb673ebe31855cc8470a06206775e646637e693776ded099b4947cf0b426c644fefbdabad1e7b49dfa6740c1875895f5007a5a9abe8c69fef7d9eef801ddac35bf677fbc705e6afc6a96694bb17eec186b5fc320ed96415a6c560f69380a1f"}, 0x85) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6_vti0\x00', r1, 0x2f, 0xb3, 0x0, 0xffffffff, 0x73, @private1, @dev={0xfe, 0x80, '\x00', 0x38}, 0x8000, 0x7800, 0x6}}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) sendmmsg$inet6(r3, &(0x7f0000001c80)=[{{&(0x7f0000000240)={0xa, 0x4e21, 0x3f, @loopback, 0x7}, 0x1c, &(0x7f00000007c0)=[{&(0x7f0000000340)="34d790ebbd123b60382c3093d84840a6cbd546af87e68e", 0x17}, {&(0x7f0000000380)="aee33ff902436391067337a82b5b9869b1d3f132e5c19001260945bd74d356a0bab73a99e1bb513b6457752fe36448bf104dd3a902ceecb63e60", 0x3a}, {&(0x7f00000003c0)="01876e65827f399f565a2b10f99275727acb2bca3b4ddbe9760d4f982460e7299519825f2759d60511057be8e247d0b7faeaac8cd1aadf050ab2ff95efa5c9b1211429973a0ac5498d03301a130236de4abb3ee35c3902dc866d9d8625cc6f77bd655d9aff9ce361a437fe760f0300b4d567f92750a320a97c857260c0d066a55057cbe1212daa9f84638c83505f6f97d4627729ec5963daf3d15b8c43c0648f48d97f799816c4745282ff10c8092009a8a6d2a6b420440711d06d9c103db7b0f7060e91587e0b70c6e1c5c6e2f94b6291", 0xd1}, {&(0x7f00000004c0)="d4880adaf5b992d27c613dac5ce29a05f2b09d96aacbdff5c6638f31ddcf53ee74a9a2d4cc5e171879bb8fddb325e8e9a9aef1f2526a6c08163fdf4a2e4ada7526cfe2798e31480c1dfa67c3dce8a7cca3b55fa46681558df145684259c520acd2d026ebc193ea4154c535a9a48d989d25459804b6c358c75d8f28c30dc283", 0x7f}, {&(0x7f0000000540)="8d0449ebf315a1d30baa870062d2c30d8314a7b9b7cd80cfbf947ead4062aaf1004b55f97c1e859b93117fc36eacadaa9a5febe70d2eafca8f4e3a90b85e867544192b23080239cc04417cd3cc12942de95e4a691239349896859d608a87b785bb5c4d109a77fcc6cdf30cede23619f7949374731135e08a48d48729bbcc5f2b0b059eef936b417749e6616ad773596d11b87a48017bcab10eb228b9", 0x9c}, {&(0x7f0000000600)="4ae034f9e297bff7afaafa58f2b7e6819fb3b908a3ef03d68cf7ef16e0557bc1f2ef98bd28b01c90fccd96d869f8beb520d125dd1f37bc44c626c35b45997abed69a213468a85fd2afb93c99fa7fd8e66bb1e23dfcf841b683a999f1639de671ce4866f06d02b8e0a1612a4a7b2805fa993be45e75fceca817468575b3ca9d1f9ef7f922f651db", 0x87}, {&(0x7f00000006c0)="55ad000c68bb81f71251d1e25f6556528efb2b5040578db0a411eb7cfdd4787bb1626328f3694cbed21c5c3d1b0570ab4ffcbab7284b960a6fcce7ef3705a40f54eafafa89249ae75f944b87a97bfc7aa25a061432da39a01118e7d4d105472f992c520addf90acb90682a72e4cbb10f1e48d994c4ccbd470589d6d4443b2e40568ba73241954bbf32b6f9f35fc817b952a12b996b07c6a7c48a763fff418d3ceef62472aefacd62b67983ee9215db5f5ed46ce8cd46c0fbc7df70f2b41d817282a6f64b8c2a5b6c44ed135d6fc262e0970cece8f38189407e40551471fd45615cbfda4d479562c19ad15d7618f7bfec8f7425f14ed5dd13c9", 0xf9}], 0x7, &(0x7f0000000840)=[@rthdr_2292={{0x48, 0x29, 0x39, {0x33, 0x6, 0x1, 0x6, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1, @private1={0xfc, 0x1, '\x00', 0x1}]}}}], 0x48}}, {{&(0x7f00000008c0)={0xa, 0x4e21, 0x1ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5b1b63dd}, 0x1c, &(0x7f0000000f00)=[{&(0x7f0000000900)}, {&(0x7f0000000940)="36ceaab12883b57007c5388d022b5da57b24e63c59116a0d450f0df966c8b3c1dd74998cf82516839b95956929e5b191523d24f7b3702dacb0cff28bf114eb28f2b61c916e9c0f09dcd2b4ddb7162feac751a80c435171ef26960ac53f8361b2629b591b389bab208a8962c317b2f0d2da06d201a50def300a5f", 0x7a}, {&(0x7f00000009c0)="acdf423a5879750fe0ebbc652c339a3c4f75d2d70b8f662784d3551e6c5d3889c3d36a93354349222f58eafef435773d14560e3984fb7fc381790614c456c4f86de3a66fa603f1e94d63c5e00dd3366808973e44eea077c623d756f1dbd2444d9aa6944aeac4aab59d7ec8bace33f15ab97a3944ce5682d46b22937bee2787049cebd921cadbaf7dbafd1af7359690e61afdac192dc8cda77a5ee3d8001ae58e0e9318267236380e3c70cf63979e0925b6090a4f8d19aa787423eafc1647f8cd52d81bdd11104153f1", 0xc9}, {&(0x7f0000000ac0)="5c1fef45a83d36befc26e8795dd315adec279fd8b29f5384afb03c58ca", 0x1d}, {&(0x7f0000000b00)="a03865cc54b63bec03ac72030c6db168ba228e16228fe9dda5963b2c17f2bae11a7e0a9a5d70ac00815d024be42527eba583bf426f900b1e963d46601ae49b6dd7bffe63222eda303af9cdbf622f99783ae32b9bb0c350dc9b3a7402b1148fe173232a30e13a2a676a6ee261db0181465390792db495c199b1338d8b239299b9d272de31358e281d8a6805ffca0f7b0e1c2bf2cca8000f9c066928e04b831953677d9cadf5ebc0b73494f057ffd5e52ad25805ad6688502b5c8b43452bbd7f7a835335b33becccfb932bdc742072956a628fba9ded2c90fae1f581142b4eafe7399fbbdeacd967122e19ce", 0xeb}, {&(0x7f0000000c00)="7c43378f6e4ed223730469ad4f6b2fcddadae57929ca35571b786bec0a4dc2d73ffdf99a9f2e7f1594b08590a49819900847fd234c73c8b3e127019c4aab59c4a28ad4a56f1f858562621c13cc9e5aed01fa9f833ad57159585cc6a38197d20a0a31779dff82c5d591758a5632696b82b923dafefadd8c829d57af9cdf82f1e21feea334edd610247582e0df7dc34d9866ad7aedcdc8a2866ccd29175a115e79b106160afca1049f215d60d38b3458b50d6f4393680722b7399397852caa5a5198dea92c760a909c5a67ba257d3dbbc4", 0xd0}, {&(0x7f0000000d00)="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", 0xfe}, {&(0x7f0000000e00)="5d5845ba03c5d59c87593f3c0b0883783575a2063e7e71595f75fab63b81cd2bf8d55e81edc11fc53eaa8a6ef8498f9020927526c376c7794415705112321bab6e99438a3d2fc6de34965e340b9a0bdf75dc129cab982c107c80864a8c292e2b7e43252b4912b98b181bb954fc9d66569fad82c78446174b4534686aebc6bf49d49e78b3f5bf0c0694b60cb4cf198e1812be3cd0c0ad0cd770bcf74d4a80674c0a9144903d4af31851be23d2bcef450a0be969cdb14725c69473cfdf64e89793dcddd04f9d61e0389622bb173798dfdcce53d0aa", 0xd4}], 0x8, &(0x7f0000000f80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @dstopts={{0xa0, 0x29, 0x37, {0x2e, 0x10, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x5}, @enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x2}, @jumbo={0xc2, 0x4, 0xd460}, @generic={0x7, 0x68, "ca4372ae8e7ac0ded8d740f0ab6d7dba3de4a5525fd4f1a5ea85f65141d8fc0fd36796cc6bbeeeabbd518bcacdfc7580de4e95abfa965f98de3cddf8984349afba5afcf3239e670930bb5e92b6fe369ef1f755441cef5a142709a2cdecb980dfdb776c7e77990236"}]}}}, @hopopts_2292={{0xe8, 0x29, 0x36, {0x88, 0x19, '\x00', [@jumbo={0xc2, 0x4, 0x40}, @jumbo, @generic={0x3}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x0, 0x88, "63a19d2473e5e39da38fe397d466a9e103a25e3e78718ce461a13ace9d293f4c6e8568e0c31fecedee5e0f505ea958f205604373ceef7a772ee04f775cfef2de893228c16141d5a4d074cfaf9c16e15ccaf52b0f1509a74697d6f4f6ead89263eb59856674b9186ea2d89a0975ab963b9017d134b6f776560cc86d1c5a905c715b6bba32fbacb82e"}, @ra={0x5, 0x2, 0x4}, @generic={0x7, 0x29, "a2b11dc7d0b4484a75b11bbf268e9a86a112ded70e4161b9d4348267fae99edb45dc367c28985e898d"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private0, r5}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7fff}}, @dstopts_2292={{0x100, 0x29, 0x4, {0x67, 0x1c, '\x00', [@generic={0x5, 0xdd, "a89b06e05e56550cab8d3e486f5ab5b6e6da92265b1de6c669863d7b9c1c51b3d3964bace77b8717a3f9615201cc6b4177736caf2e4a373325930807d2b0c6bf2ee75fa6101eed43017c721389af30d7ed62c3a1dfbd0c5d6171df7e29a2f5ee52e868e65a656bf775f7fc36c7f5e783ac598b44623893253849bbbf361535a06a5f4b18504e362513954451a8040ffdac4bdc609f58af8eac549ff7dcd5ed1e52de13534614d4ae4fae89420cb3e7a0df6888ef2b819281c1417a32e15796b9b931bd8ad6c4a87da5e4c81107f8d964f2f45085d5e6f93ef57c439b1c"}, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x2fbbfdd363856fd9, 0x1, '\x00', [@padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0xfff}]}}}], 0x320}}, {{&(0x7f00000012c0)={0xa, 0x4e23, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}, 0x80000000}, 0x1c, &(0x7f0000001480)=[{&(0x7f0000001300)="4be5c22f8a82017d127a80f8438e40c54c0757ebeabe55a4cb78e2a9da8fd0a7733ad51279189aca3c740253e74a3552116840d3619ea8f798fca7e64ccad8c42dd6e96a827ec97f49986c47fe3fa5d5aed77e22e218c34bcb416e0558208ab0db88d0b6bdd54be92b6513f0aafc9df1a299bafe00992c55c2b347db671d46539668a35131c06ea9347f235cfff873f884ab0c5a4479e95f18d7b9eb647157166f095f4ab24faa2d7416b353986fdfa020b6a92740a51c1d8df2f5b5428eebb817a3f20ae25cd1317811032f9c2422292d8b819cdc", 0xd5}, {&(0x7f0000001400)="6bcbaba65573820e421c83c6b9392f36e02be08a70304cb79256516a1202904c8ea01260aca3c5ed90df350312348705859686d8251fa463541338296dd0967bc5df89858f204f42f99d6659cf43026c5882f9fe9f0495a0d24d06a4be7de17d2b6662bb0e5420bd5fb5a1e35faa8f491820ee848fe7d1b922832cf6150fbc12", 0x80}], 0x2, &(0x7f00000014c0)=[@hopopts={{0x1a8, 0x29, 0x36, {0x2b, 0x31, '\x00', [@calipso={0x7, 0x20, {0x1, 0x6, 0x8, 0x7, [0x6, 0x2, 0x65]}}, @generic={0x4, 0x23, "93a23427737a07094f7ced63b456e653ae328232e4b0fa4962bb15d841b76abbb65968"}, @generic={0x8, 0xd9, "3d70d47556c0aa4ce0f56afe36fff1fa2302594acf5f8961db53a228951fa1d9030966d9171d78a023da7c2101dbe80183c9853a0f4930f9115c41b9caf93487d55457f0321668c371439412816ad9b83be313e8d32b537dc32ee537cc1add604fc35487b3a8f7fd990d7e70ebca1a702a383b0d771eea133198e7df06e042c92fbfcd715f5bba94967ed07030595e1286fd130cc7ef4db9f4ce7c9a1ba8b53fe83eebb69b7a901421510bd04df087bd1d9ee4b3b679178ccf8c6f9c91b16d9e1ed389b6a703e20e21b7cb916db1aa96df716d6a8a00f38173"}, @ra={0x5, 0x2, 0xe99}, @calipso={0x7, 0x50, {0x2, 0x12, 0x7, 0x100, [0x57f9ccf3, 0x81, 0x6, 0x5, 0x8, 0x5, 0x9, 0x7, 0x8000]}}, @enc_lim={0x4, 0x1, 0x5}, @ra={0x5, 0x2, 0x6}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x2f, 0x5, '\x00', [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x7}, @jumbo={0xc2, 0x4, 0x40}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x67, 0x6, 0x0, 0x3, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @loopback, @private0]}}}], 0x250}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001740)="b6b9d8ead1396a7ffc448d357a62510c4c42942a998af175c25f5ae161a516a4dc4f7e1eca809a4795e1dc46be6da3cfc774eec8d002959ab8d8e3f66d95eb1230d70e20870f9252af16f52bb201af98bc39e286eb064e66a3b0c93171464a682c77112808e270adda76a8590dc05ad02f574320dc1c15a35c1f53e9ada39b362df04435e8222e1e1f69c158870cba6935a99bf003d8beea0c3d189913", 0x9d}, {&(0x7f0000001800)="0cd629e4e964aa7e70165dc2c69bea038a8eaa7ade0bc0069609a287df2e535824c3930ab90a0e53b853f82284b564b9c7e5409b35e29b19cbb5be6a6a158ebbcb540a624dcea08aa1862ce69ceb6d7b323c5d9ab3da23c4aedfb8ba1a340a9fdecbce7ce2b09e03f1cc1289f5116f0d23f0c9211bca4bc6c1b60f86690238a6633c74aa925cfc3409d5e1c5ba1ae1fab8c523a97247", 0x96}], 0x2, &(0x7f0000001900)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x2c, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0x8}, @calipso={0x7, 0x10, {0x0, 0x2, 0x80, 0x9, [0x3f]}}]}}}, @hopopts={{0x20, 0x29, 0x36, {0x0, 0x0, '\x00', [@pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @flowinfo={{0x14, 0x29, 0xb, 0x3f}}, @dstopts_2292={{0x160, 0x29, 0x4, {0x3a, 0x28, '\x00', [@generic={0xff, 0xbe, "b0f13d66af2c6d43716bc03a1be0a7be4d74f1bb8dbbfb73c6262b8ef3ec519fd311f975b59eaac943a9147104766129d86bd7be6abbcefd603615a0634ac137466947f1d4f1cf7469f3d817a6449bf827e88629f2e4013211bc1f50102c7fc21b370745108cda873368c954fd5687376ee046e592fc2e5f847f882b388987c62792fdb15f2c6f6b210fa4764c95d6a60803854100caee0bd8d6989de3036f5354abdc34dceed34ad7b4f9175a05dff66a2794842af07fd21033f4d388f3"}, @hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0x3ff}, @calipso={0x7, 0x48, {0x2, 0x10, 0x8, 0x7, [0x1664, 0x6, 0x2, 0xfff, 0x0, 0x2, 0x1, 0x2]}}, @enc_lim={0x4, 0x1, 0xba}, @hao={0xc9, 0x10, @private1}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7f}}], 0x210}}, {{&(0x7f0000001b40)={0xa, 0x4e21, 0x3ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, 0x1c, &(0x7f0000001b80), 0x0, &(0x7f0000001bc0)=[@rthdr_2292={{0x98, 0x29, 0x39, {0x67, 0x10, 0x3, 0x7f, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x2d}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}, r1}}}], 0xc0}}], 0x5, 0x0) getitimer(0x1, &(0x7f0000000080)) [ 2348.545139] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:40:54 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:40:54 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) 20:40:54 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 7) 20:40:54 executing program 6: ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000001e00)={{}, 0x0, 0x2, @inherit={0x60, &(0x7f00000003c0)={0x0, 0x3, 0x4, 0x2, {0x10, 0x71, 0x9, 0x8}, [0x0, 0x5f9c, 0x8]}}, @name="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"}) r0 = socket$nl_audit(0x10, 0x3, 0x9) mount(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb51d, 0xed5}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="01000000000000002e2f66696c65302f66696c653000"]) mount(0x0, 0x0, 0x0, 0x300b4e2, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r5}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x2, 0x0, 0x22, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r1, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000e00", @ANYRES32=0x0, @ANYBLOB="6d6e09ca044e459fc78ca27728297fa689f9108b9e5a3e210d9015b24011d6cc3f97cd895030adcb9295ad"], 0x1c}}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) sendmsg$AUDIT_USER(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000d00)={0x10}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x0) 20:40:54 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xffffffff00000000) [ 2365.777422] kauditd_printk_skb: 11 callbacks suppressed [ 2365.777442] audit: type=1326 audit(1705351254.083:1020): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:40:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x164, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:40:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)="e518f047268d23a3ed7510d9e89ad0a5cccc32bca166db006bfa96c7f1d0fab41e28367ccd893b13c895f2bcf1fd360d91d3e6a96e15b06644144824f2eac9df0ca8a007ecbc118a7ae94f0864d8ede302ef4a2d592b2db3c91f8d36d355a90d98932a7dd9af7a3c3fb087ee015eca85967ecdd84d14e5613c2c27089789f06d077f53419b2eb731d2fb89692d9e1ef33c385f0920d22e67c3aa5c46594fdebf1487ea30ffc05eb378451f5171383c", 0xaf}], 0x1, 0xc6000000, 0x2, 0x1) 20:40:54 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2365.792420] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2365.811026] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2365.818732] audit: type=1326 audit(1705351254.123:1021): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:40:54 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0xfffffffffffff000) [ 2365.842976] audit: type=1326 audit(1705351254.123:1022): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2365.862243] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2365.884307] audit: type=1326 audit(1705351254.124:1023): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:40:54 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x2e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) openat(r1, &(0x7f0000000080)='./file0\x00', 0x2, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x443, 0x24) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e24, @empty}}, 0x0, 0x0, 0x3c, 0x0, "cf59a2ee87b7d8a087f850a676b21868f837907a56c661e082736584741aa6c3ae906822427ee654a739221ff3a4214bfbfc343c9d320e0ea6f631fd7331f5fafd684d9e8ca5240d1cb521b0515615bb"}, 0xd8) [ 2365.921430] audit: type=1326 audit(1705351254.133:1024): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2365.949048] FAULT_INJECTION: forcing a failure. [ 2365.949048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2365.952025] CPU: 0 PID: 18574 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2365.953622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2365.955392] Call Trace: [ 2365.955957] dump_stack+0x107/0x167 [ 2365.956734] should_fail.cold+0x5/0xa [ 2365.957560] __alloc_pages_nodemask+0x182/0x600 [ 2365.958545] ? xa_load+0x12d/0x2c0 [ 2365.959301] ? lock_downgrade+0x6d0/0x6d0 [ 2365.960193] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2365.961499] alloc_pages_current+0x187/0x280 [ 2365.962428] __page_cache_alloc+0x2d2/0x360 [ 2365.963352] page_cache_ra_unbounded+0x207/0x6f0 [ 2365.964363] ? read_pages+0xbc0/0xbc0 [ 2365.965164] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2365.966155] ? __is_insn_slot_addr+0x14c/0x290 [ 2365.967164] ondemand_readahead+0x8e5/0x1150 [ 2365.968115] page_cache_sync_ra+0x138/0x170 [ 2365.969038] generic_file_buffered_read+0xc8e/0x2920 [ 2365.970112] ? stack_trace_save+0x8c/0xc0 [ 2365.971026] ? alloc_pipe_info+0x1e5/0x590 [ 2365.971927] ? pagecache_get_page+0xc80/0xc80 [ 2365.972880] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2365.973888] generic_file_read_iter+0x33f/0x490 [ 2365.974884] ? __fsnotify_parent+0x488/0x9d0 [ 2365.975814] ? iov_iter_pipe+0xf1/0x2a0 [ 2365.976675] generic_file_splice_read+0x455/0x6d0 [ 2365.977705] ? pipe_to_user+0x170/0x170 [ 2365.978546] ? _cond_resched+0x12/0x80 [ 2365.979399] ? avc_policy_seqno+0x9/0x70 [ 2365.980260] ? selinux_file_permission+0x92/0x520 [ 2365.981295] ? lockdep_init_map_type+0x2c7/0x780 [ 2365.982303] ? pipe_to_user+0x170/0x170 [ 2365.983162] do_splice_to+0x10e/0x160 [ 2365.983984] splice_direct_to_actor+0x2fe/0x980 [ 2365.984972] ? pipe_to_sendpage+0x380/0x380 [ 2365.985891] ? do_splice_to+0x160/0x160 [ 2365.986747] ? security_file_permission+0x24e/0x570 [ 2365.987838] do_splice_direct+0x1c4/0x290 [ 2365.988729] ? splice_direct_to_actor+0x980/0x980 [ 2365.989757] ? selinux_file_permission+0x92/0x520 [ 2365.990787] ? security_file_permission+0x24e/0x570 [ 2365.991869] do_sendfile+0x553/0x1090 [ 2365.992701] ? do_pwritev+0x270/0x270 [ 2365.993521] ? wait_for_completion_io+0x270/0x270 [ 2365.994560] ? rcu_read_lock_any_held+0x75/0xa0 [ 2365.995558] ? vfs_write+0x354/0xa70 [ 2365.996364] __x64_sys_sendfile64+0x1d1/0x210 [ 2365.997323] ? __ia32_sys_sendfile+0x220/0x220 [ 2365.998331] do_syscall_64+0x33/0x40 [ 2365.999141] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2366.000231] RIP: 0033:0x7f85f7bb8b19 [ 2366.001020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2366.004886] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2366.006492] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2366.008022] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2366.009535] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2366.011040] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2366.012546] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 [ 2366.018883] audit: type=1326 audit(1705351254.134:1025): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2366.027407] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2366.055890] audit: type=1326 audit(1705351254.134:1026): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2366.066618] audit: type=1326 audit(1705351254.134:1027): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2366.091867] audit: type=1326 audit(1705351254.159:1028): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2366.163668] audit: type=1326 audit(1705351254.160:1029): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18547 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:40:54 executing program 7: sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xb8, 0x0, 0x20, 0x70bd28, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000001}, 0x4048810) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) sendmsg$nl_generic(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa4, 0x34, 0x300, 0x70bd25, 0x25dfdbfc, {0x11}, [@typed={0x9, 0x5, 0x0, 0x0, @str='ext4\x00'}, @generic="993490ad4174e8bdaa9fb64ecea414e34937509344dbf98a0b177a6ecc664529c037bed59a746f7a693e7eefe0f6859c3689f538f822a9f3609f60eceaf4fbae53b8b5226e87aef9fb8705ee48070030c90227198f23934f0a5763533fe10454b61fd7ebeb5c31eaddd2e0a52f94028dec26dd5bae56c4e569184fc31b72f5bbd2"]}, 0xa4}, 0x1, 0x0, 0x0, 0xfeeb8228f58420c9}, 0x40840) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$BTRFS_IOC_SNAP_DESTROY(r3, 0x5000940f, &(0x7f0000001340)={{r4}, "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"}) mkdirat(r2, &(0x7f00000000c0)='./file1\x00', 0xc0) 20:40:54 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_io_uring_setup(0x4ee5, &(0x7f0000000080)={0x0, 0x806cb0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x2160}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd=r3, 0x0, 0x0}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 2366.259356] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:40:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) r2 = creat(0x0, 0x101) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000100)={0x0}) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r4, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC=r3, @ANYRESHEX=r4]) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000000c0)={r3, 0xc694, 0x7ff}) 20:40:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x164, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x4c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:40:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f00000006c0)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x2000000001600}], 0x402, &(0x7f0000012900)=ANY=[]) r0 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="045220bc518be756d9a5a57a65839a35e12abb1b52843ed9e47b54ab1e200df76834bb97813257641872fbcabb3acb033badbf6b3da664a345cd8fcb5ad4e2c4311fdf0ce39259", 0x47}], 0x1808c, &(0x7f00000002c0)={[{}, {@nojoliet}, {@session={'session', 0x3d, 0x3a}}, {@nojoliet}, {@dmode={'dmode', 0x3d, 0x7}}, {@gid}, {@hide}, {@gid={'gid', 0x3d, 0xee01}}], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@measure}, {@audit}, {@permit_directio}, {@hash}, {@appraise}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@measure}]}) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) [ 2366.668178] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2366.750107] EXT4-fs (loop7): couldn't mount as ext3 due to feature incompatibilities 20:40:55 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) [ 2366.846699] EXT4-fs (loop7): couldn't mount as ext3 due to feature incompatibilities 20:40:55 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 8) [ 2367.127270] FAULT_INJECTION: forcing a failure. [ 2367.127270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2367.130299] CPU: 0 PID: 18766 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2367.131760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2367.133537] Call Trace: [ 2367.134099] dump_stack+0x107/0x167 [ 2367.134876] should_fail.cold+0x5/0xa [ 2367.135674] __alloc_pages_nodemask+0x182/0x600 [ 2367.136623] ? xa_load+0x12d/0x2c0 [ 2367.137362] ? lock_downgrade+0x6d0/0x6d0 [ 2367.138242] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2367.139493] alloc_pages_current+0x187/0x280 [ 2367.140410] __page_cache_alloc+0x2d2/0x360 [ 2367.141298] ? page_cache_ra_unbounded+0x218/0x6f0 [ 2367.142341] page_cache_ra_unbounded+0x207/0x6f0 [ 2367.143341] ? read_pages+0xbc0/0xbc0 [ 2367.144123] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2367.145122] ? __is_insn_slot_addr+0x14c/0x290 [ 2367.146082] ondemand_readahead+0x8e5/0x1150 [ 2367.147006] page_cache_sync_ra+0x138/0x170 [ 2367.147936] generic_file_buffered_read+0xc8e/0x2920 [ 2367.148972] ? stack_trace_save+0x8c/0xc0 [ 2367.149866] ? alloc_pipe_info+0x1e5/0x590 [ 2367.150743] ? pagecache_get_page+0xc80/0xc80 [ 2367.151684] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2367.152717] generic_file_read_iter+0x33f/0x490 [ 2367.153674] ? __fsnotify_parent+0x488/0x9d0 [ 2367.154579] ? iov_iter_pipe+0xf1/0x2a0 [ 2367.155411] generic_file_splice_read+0x455/0x6d0 [ 2367.156402] ? pipe_to_user+0x170/0x170 [ 2367.157211] ? _cond_resched+0x12/0x80 [ 2367.158012] ? avc_policy_seqno+0x9/0x70 [ 2367.158849] ? selinux_file_permission+0x92/0x520 [ 2367.159842] ? lockdep_init_map_type+0x2c7/0x780 [ 2367.160812] ? pipe_to_user+0x170/0x170 [ 2367.161700] do_splice_to+0x10e/0x160 [ 2367.162487] splice_direct_to_actor+0x2fe/0x980 [ 2367.163456] ? pipe_to_sendpage+0x380/0x380 [ 2367.164351] ? do_splice_to+0x160/0x160 [ 2367.165184] ? security_file_permission+0x24e/0x570 [ 2367.166248] do_splice_direct+0x1c4/0x290 [ 2367.167109] ? splice_direct_to_actor+0x980/0x980 [ 2367.168107] ? selinux_file_permission+0x92/0x520 [ 2367.169108] ? security_file_permission+0x24e/0x570 [ 2367.170132] do_sendfile+0x553/0x1090 [ 2367.170931] ? do_pwritev+0x270/0x270 [ 2367.171702] ? wait_for_completion_io+0x270/0x270 [ 2367.172715] ? rcu_read_lock_any_held+0x75/0xa0 [ 2367.173654] ? vfs_write+0x354/0xa70 [ 2367.174416] __x64_sys_sendfile64+0x1d1/0x210 [ 2367.175337] ? __ia32_sys_sendfile+0x220/0x220 [ 2367.176264] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2367.177320] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2367.178364] do_syscall_64+0x33/0x40 [ 2367.179136] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2367.180173] RIP: 0033:0x7f85f7bb8b19 [ 2367.180927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2367.184661] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2367.186202] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2367.187668] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2367.189114] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2367.190570] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2367.192027] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 20:41:12 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 9) 20:41:12 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x80001, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x8b}}, './file1\x00'}) openat(r0, &(0x7f0000000140)='./file0\x00', 0x400, 0x2) 20:41:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) 20:41:12 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x238, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x120, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xd4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2384.528498] kauditd_printk_skb: 25 callbacks suppressed [ 2384.528510] audit: type=1326 audit(1705351272.825:1055): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2384.532158] audit: type=1326 audit(1705351272.834:1056): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:41:12 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2384.548046] audit: type=1326 audit(1705351272.834:1057): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:41:12 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_io_uring_setup(0x1da0, &(0x7f0000000080)={0x0, 0x0, 0x20, 0x1, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r8, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_submit(r3, r7, &(0x7f0000000140)=@IORING_OP_CLOSE={0x13, 0x4}, 0x5) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'rose0\x00'}) accept$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x3, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {0x1}, 0x0, {0x0, r9}}, 0xfff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x31081000, &(0x7f0000000100), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:41:12 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2384.556284] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2384.559378] audit: type=1326 audit(1705351272.836:1058): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2384.564454] audit: type=1326 audit(1705351272.836:1059): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2384.571081] audit: type=1326 audit(1705351272.838:1060): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2384.577415] audit: type=1326 audit(1705351272.838:1061): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2384.590206] audit: type=1326 audit(1705351272.838:1062): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2384.614705] audit: type=1326 audit(1705351272.838:1063): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 20:41:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x20000161, &(0x7f0000000000)=[{0x0, 0x3, 0x82, 0xdb15}]}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'ip6_vti0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x8}}) getitimer(0x2, &(0x7f0000000080)) [ 2384.639470] audit: type=1326 audit(1705351272.838:1064): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=18821 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2384.650978] FAULT_INJECTION: forcing a failure. [ 2384.650978] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2384.652630] CPU: 0 PID: 18867 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2384.653479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2384.654510] Call Trace: [ 2384.654850] dump_stack+0x107/0x167 [ 2384.655323] should_fail.cold+0x5/0xa [ 2384.655812] __alloc_pages_nodemask+0x182/0x600 [ 2384.656389] ? xa_load+0x12d/0x2c0 [ 2384.656847] ? lock_downgrade+0x6d0/0x6d0 [ 2384.657359] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2384.658118] alloc_pages_current+0x187/0x280 [ 2384.658672] __page_cache_alloc+0x2d2/0x360 [ 2384.659246] page_cache_ra_unbounded+0x207/0x6f0 [ 2384.659896] ? read_pages+0xbc0/0xbc0 [ 2384.660403] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2384.660995] ? __is_insn_slot_addr+0x14c/0x290 [ 2384.661604] ondemand_readahead+0x8e5/0x1150 [ 2384.662203] page_cache_sync_ra+0x138/0x170 [ 2384.662758] generic_file_buffered_read+0xc8e/0x2920 [ 2384.663429] ? stack_trace_save+0x8c/0xc0 [ 2384.663995] ? alloc_pipe_info+0x1e5/0x590 [ 2384.664555] ? pagecache_get_page+0xc80/0xc80 [ 2384.665154] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2384.665786] generic_file_read_iter+0x33f/0x490 [ 2384.666373] ? __fsnotify_parent+0x488/0x9d0 [ 2384.666931] ? iov_iter_pipe+0xf1/0x2a0 [ 2384.667446] generic_file_splice_read+0x455/0x6d0 [ 2384.668050] ? pipe_to_user+0x170/0x170 [ 2384.668545] ? _cond_resched+0x12/0x80 [ 2384.669034] ? avc_policy_seqno+0x9/0x70 [ 2384.669568] ? selinux_file_permission+0x92/0x520 [ 2384.670208] ? lockdep_init_map_type+0x2c7/0x780 [ 2384.670843] ? pipe_to_user+0x170/0x170 [ 2384.671375] do_splice_to+0x10e/0x160 [ 2384.671920] splice_direct_to_actor+0x2fe/0x980 [ 2384.672514] ? pipe_to_sendpage+0x380/0x380 [ 2384.673069] ? do_splice_to+0x160/0x160 [ 2384.673588] ? pipe_to_sendpage+0x380/0x380 [ 2384.674160] do_splice_direct+0x1c4/0x290 [ 2384.674703] ? splice_direct_to_actor+0x980/0x980 [ 2384.675363] do_sendfile+0x553/0x1090 [ 2384.675872] ? do_pwritev+0x270/0x270 [ 2384.676346] ? setup_APIC_eilvt+0x2f0/0x2f0 [ 2384.676914] ? tick_program_event+0xa8/0x140 [ 2384.677479] __x64_sys_sendfile64+0x1d1/0x210 [ 2384.678062] ? __ia32_sys_sendfile+0x220/0x220 [ 2384.678646] do_syscall_64+0x33/0x40 [ 2384.679128] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2384.679808] RIP: 0033:0x7f85f7bb8b19 [ 2384.680304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2384.682603] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2384.683598] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2384.684483] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2384.685404] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2384.686320] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000001 [ 2384.687256] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 sendmmsg$inet6(r0, &(0x7f0000005b80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000140)="fb107507bf635e8df65c762cda6f8df5aade8f6452bdae4032ffe00af4204b2607960af0760930d54e077ce14b25a4a97bc23b7942032d84bfbb8f7824a4369d2c40d6c631c9e007e05c54ed8480379f2fb3540cca5cde637e570ded5b70d03f43117122f157136841e51397d69ea8c36020d89be0545cb97de06a6a0a65f9d485a9219bd31b289ad6054d8d71b58af9239f534d0f62b6c78f26f3a77446b9", 0x9f}, {&(0x7f0000000340)="3cea4610c43489442b17bcb8856c2a5332fa09596b7572e512d5394a59ee08f6f73e8a2aaacdbbd5d84cea4275cd9b0f4254ca73b303b3815c36cede54d1007f04db8c99051f6cad2cb3d0efc5f3208ebb34b80863f0d9369f5be62df749565f2ed1c4ae498d1c6dcc301a27678179955fdd1e9062876f2ffbcd2dd1a3fc6513603d06354e2a4229bf9f91d62c15486df3600677cfc7b30a9647f0ed2380088e76fc4a6a8cae59e923e50e", 0xab}, {&(0x7f0000000400)="19e3d4a248900c6a71ed4de93bc4c50208aa1cf907a184403e39c57457d1bd99690df1189b7c0a7b5b9ff3f754bc76e2532f264bd70ed8741ef0d5602220a950e20e924ac93f819a8023a0752d9225c9ba9c487db49baa48e73b2991629315b074045f4720fe9f0f1b2bcfd2442b844c421ac1f8ad5933b9e7cb4f01f3f7971121e75ca9b9", 0x85}, {&(0x7f00000004c0)="86a2fb92756a95975ca7df4b7622bed39b18c444e29c7304c5f722c4b7d6c11ece26b9f2bc55846e4b8573ec21eac39b7fb54f08fd9bce4b84571f908870d572505345b8849848efb1c3c1a5cec4b51349cdf6d57d59dd8667e21f57b057a44b46d3b320755b7f96ae49e1c75454db94eb660409fe0bc7157c2e4340720a02c2b24b7313abc357f1968feb9305a61d03c7e71a2858c8b970e1970f6eb6b6e2b63f1f44ba94a2f7c52f74fe6721cb525882d7803e1df965f1a48fa9694e0592972fad68f90458bdd590b9d5c313a94761f7d41125f66431557c0ea912da92ff29a0f429850133d258c1e627519e3467e1f52ec2", 0xf3}, {&(0x7f00000005c0)="efe46d1bb6a14c0913b09a52355a67edcc1cba42832fc4e1c4b7f8d42f6d47ff63b937aff4eead2ce94ef98ec0388a9be780af01e268d47b0a4b63fa3e75aa42c1afc27e7f7d468c603680928a89535789d6417b96a9ba323e9048289f30fbf965e3fff3178c1882c86995a503c5b3d22bdd066bbdabf0b57610f97287830f3b4ea024697d9ad0b744b4cb8ac1ea37f6541d75abff07eebc971e2f7f7b8d3a1344d187f56c0924682e8d33c3b547fafcc41f8341d415a405e025e0ffbfd690c0b83f3223d405dff0920663191f702b41796d801b8cf3d4dbb3ec81539376b1faded7b8655b1d542014b84f44", 0xec}, {&(0x7f00000006c0)="bb6739ff9808b1b45ed23e6365688056becd3c66b2fec2cda8afc380e8261762e7cf431493668daf257e31a16fb2577a113eae2b4d8c4c6f467c44da994a5cff6dc81e55802da88a5874d08a231f23cba04b5c850f480367748b257633cc82a12f8e04c984762dd679464801d0937e80ea69abbd9e244fd39b25c43243ba149a9091c28bde3f8daed755638259e9e56127d6f0d5282f7581b1d44437b26543d993aa9a2598559e849453c4691a93bf860541d975943c8777c32fe7717438ff268202f694499a3bced97b775b2a9833a1d7832b02a298856c485126f9931f35310f56668913ea2859ba", 0xe9}], 0x6, &(0x7f00000007c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x81}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}, @hopopts_2292={{0x90, 0x29, 0x36, {0x2e, 0xe, '\x00', [@pad1, @generic={0x1f, 0x71, "23dca06a6d1614a32c48d10e07be679715125ea81ffc234e84fdb0651a1f8e2001329a01274310c8d974d2bdfdb49342bdaede0968b7af37e6ce6700119ff6b6a87319ebbe40c131c2452dfe93073b898215c4b3a821579ef80d42ad60e737cf55815338d93d6f9114fb1f7f25c337ea2a"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x3}}, @dstopts_2292={{0x140, 0x29, 0x4, {0xe5, 0x24, '\x00', [@generic={0xc2, 0xf1, "4292748149a786f2b89104f18bfc383e752810859b436c18a5169c2be5cad356f3a3e61610db83540b3df7bab554771010a433f88b6602eaacd5b3bd9642111d5eef4b05ccb48996c04e883ae2594a9980172e7080b07bcf06adbae09e6e50092d525914d111cca29bca4abb95f4cde6b383a1517eda746ad3ad1cc8f2ff57a056b26712d8c2af89a623abc448bdf5111d7eafbddb8eb620856af9102126644bb97153858a355a8f5eb1d190462f3f01728019b18d0f9f33c31e65bf0a6ff7b8d737a7fc286bc1dd35b047660dc7e57a2d33ffe024db5fc040702e90e692d6697a4f3b253fd4288f850dd5e8b51bcc504c"}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @pad1, @ra={0x5, 0x2, 0x7}, @calipso={0x7, 0x18, {0x3, 0x4, 0x0, 0x200, [0x9, 0x7]}}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}], 0x230}}, {{&(0x7f0000000a00)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x3a}}, 0x1c, &(0x7f0000000ec0)=[{&(0x7f0000000a40)="e07a86bbca253ec48a4ef1e12939848b13f9c56b07445172dcbd8ab2c635cf3a0f2791fcfec4f0c21a1bd51425a5324f3363d86a9cedd85e55aa8660de23420eea7d65421eb2a92354756ebd050e7bf6446a5a823889533e9603c552212b90f4156fb6893053b0bf144117ca0aaec4b3959f93cc6dd7ee46dc80d11eeb5dafa72ead663468b0ba229e0275432c23e2d7e3e7", 0x92}, {&(0x7f0000000b00)="ee4b4a28703ccfe4f417df7b20268e9a2a564e64218bc4da60fe4e91182dd791bd6003ffb3", 0x25}, {&(0x7f0000000b40)="3aa018a564fad5b8043eddf2786332821983f4d821f618762380e131224a9edca663e1c8442c631c32bdfc0ddae7daf622f2c7cefe05ab4448675b5310bf8c165209d74153c803cee5dd70d8a4a8daf0638ca8e5ff13e86ccd393c0e53bf71ae16f41bb163ea08fd7bc59a1a63af4343cb265b37476506250f4a8c0587347b2ac2d1181907b9cb0e8304e839", 0x8c}, {&(0x7f0000000c00)="9ed5def862618d76e652ab3589565f1a93b8cc11395587b971848f20f31f9a85a0aa66734e5f0936a05ec431708f111e78c58f6322e5a8c11ec6ecbf57a8236de93618459bfb9319b8090239fc126c48f049ecd5d63b8766148d01240dd8f9e2f390b9609c7131440d4ae732dd1a42112fd3702075f564e748e442ea39594206985dcbe747e4656c56d2b5ccec92ac2650", 0x91}, {&(0x7f0000000cc0)="64cfdacd4f1d1fa84df2ff804e240c71a9aebf5a961b12e2d76d9a284a24b2d959a4687ffb806da62f7c9f459aec3bbff20da3159173f2866b0a1522682e93398412b7f6a71c3c1759ad9c5e99065c248362d6fb6e5b90933f47f8eafe3b43a30daab371feef4e5e2c1278c34d17d84446e6aba33d325484a3d2fb78edaf68be73e91d579c251735837b37895417", 0x8e}, {&(0x7f0000000d80)="fec18efdc3f76bdd7ed1", 0xa}, {&(0x7f0000000dc0)="e5769adf5c08fb9121df4c46a337c4aa15c3c6fa5045aef7254169dd0801912b4503c2013db1cc622c56ae6bd071576b40303f31bdc0f067cb9727d22a1b0e8484cecf53fb6297be0afc74f5e54dbff38705bf08c2d1be372a1e6b0b782d634704f994ae19cd1d11f454ce62d5d94933", 0x70}, {&(0x7f0000000e40)="753100bc9a68481989c2e47566038892cf3c5a84ed6a760363317588487343f1867cf93d5c846d5ad6622b7f3b05e023ede35c19cf50e5ffce3d983beb226b5b7a2a2d1927fe6d39a44b7804fde72568b0c5f22d2b589e6e2721ef0df10312a11256f8b9664aa16feb9f8f1556ee19970eea7a891b", 0x75}], 0x8, &(0x7f0000000f40)=[@hopopts_2292={{0x30, 0x29, 0x36, {0x5c, 0x2, '\x00', [@hao={0xc9, 0x10, @empty}]}}}, @rthdr={{0x98, 0x29, 0x39, {0x0, 0x10, 0x1, 0x80, 0x0, [@mcast1, @loopback, @rand_addr=' \x01\x00', @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast1, @local]}}}, @rthdrdstopts={{0x1030, 0x29, 0x37, {0x87, 0x202, '\x00', [@generic={0x5, 0x1000, "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"}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x9}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x1d, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0xf81}]}}}], 0x1130}}, {{0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002080)="1222f107acdc0529915f24eb60138aa49c89857f8e76454ca450ba019bdfa75ec921101355d3ce3f45004488de0f197e5f837fb2ebaa15e0eed63984bf151ab6688fa2071436d6bcd5952fee284c23e7a6ee60edfc722462254969bb954e0c078677b4d80a374acab886064011d8bad77c42a2efc20b73027db9ab38faa939355f848a5c788f31bff68dc0e34c83024128eec55980b9088a53fff50acb45dacf2851c148740915df9d31e69df5898f", 0xaf}, {&(0x7f0000002140)="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", 0x1000}], 0x2, &(0x7f0000003180)=[@rthdr={{0xb8, 0x29, 0x39, {0x1d, 0x14, 0x1, 0x3, 0x0, [@empty, @empty, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, @empty, @ipv4={'\x00', '\xff\xff', @local}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast2, @mcast1]}}}, @dstopts_2292={{0xb0, 0x29, 0x4, {0x2b, 0x12, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}, @jumbo={0xc2, 0x4, 0x6}, @jumbo={0xc2, 0x4, 0x200}, @pad1, @jumbo={0xc2, 0x4, 0xffff}, @calipso={0x7, 0x48, {0x1, 0x10, 0x2e, 0x40, [0x3, 0x365a, 0x8, 0x6, 0x1, 0x2, 0xfffffffffffffff9, 0x3]}}, @ra={0x5, 0x2, 0xffff}, @calipso={0x7, 0x10, {0x3, 0x2, 0x0, 0x591, [0x1f]}}, @jumbo={0xc2, 0x4, 0xb67}]}}}, @dstopts_2292={{0x168, 0x29, 0x4, {0x2e, 0x29, '\x00', [@generic={0x1, 0xff, "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"}, @enc_lim={0x4, 0x1, 0x4}, @jumbo={0xc2, 0x4, 0x8}, @hao={0xc9, 0x10, @local}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x4}, @calipso={0x7, 0x10, {0x0, 0x2, 0x1, 0xf001, [0x1]}}, @hao={0xc9, 0x10, @mcast1}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x8001}}, @rthdrdstopts={{0x120, 0x29, 0x37, {0x89, 0x20, '\x00', [@ra={0x5, 0x2, 0x400}, @generic={0xca, 0xa, "7d79f775e7c6b23a58f6"}, @padn={0x1, 0x1, [0x0]}, @generic={0x1, 0xea, "92a2ef3ed115e10580602040671f4b3fe44ef2e76c58d743ac37935d580267d7f96971d33e9188649bff93a9054d21e97969789c0c1147d0ac78674a1cde64be5fef26d0df0bcb37dc2bd94fc7dd698caeddefab898107f023bd2e75e3fc7806c412287c8c016a01fc8cdf62419c5251762534c14ef27150cf77aac37b895748eedd9b083f55f1210586b4a387a44b185c51afe58147bd03e91c089b98892a6784b6995ad617450ecfd7781a261040d3f4db82745226df2647e55c4707458fe83183e5a462b762daa815d1f572aabb346d8fb0a6fdefb856be2587cbe33646694b8376ef309c31fedd72"}, @jumbo={0xc2, 0x4, 0xfff}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8000}}], 0x420}}, {{&(0x7f00000035c0)={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, '\x00', 0x11}, 0x80000001}, 0x1c, &(0x7f0000004740)=[{&(0x7f0000003600)="c9abea509e9372208a55b794decd0999f1afcb37bac0f449154ecaf3a616d2fe44e033ab1731d6dadf7b1ccc30af3f0b282051acf3b47fcd0cf37bc9cc272e2692157927ae1377aa9c7b7c3e23d50cbb4da4debe63b81c44c8f0e62b3d3a5df690b3ed00ec328bbcbdf4be2f1a92a3819ed589abc32ed61c0f2a6933242bac0827a5440c22e20425fc75a69c5742379520cf1decf7be932534", 0x99}, {&(0x7f00000036c0)="66b964ba3ccdcfc2cb35fe15919d9d5d5b1615c2be35f456e3f0320d584f5ae20aa1f870976e621a0dcd0964aedbf423221de6fb6ff3d8175df6d9015e76a9079111ae7eb6dc9f", 0x47}, {&(0x7f0000003740)="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", 0x1000}], 0x3, &(0x7f0000004780)=[@flowinfo={{0x14, 0x29, 0xb, 0x8}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x2b, 0x4, '\x00', [@jumbo={0xc2, 0x4, 0x7f}, @jumbo={0xc2, 0x4, 0x10001}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}]}}}], 0x58}}, {{&(0x7f0000004800)={0xa, 0x4e22, 0x19, @private1, 0x5}, 0x1c, &(0x7f0000005a80)=[{&(0x7f0000004840)="fcf55b05d82a869e3ae157aa8fe72a4ef1bad9dfb9b85331f4d27e6747ff8558cede6daa08201f9b309d179176c86b6198bee480394aa3f012d45a5e35679e6d4d9dc4", 0x43}, {&(0x7f00000048c0)="56129df2e3b67347ff6804eae22f27164358bb9ac479265bd60d6f63112bbabaa072d8af83ddbff4903105f4b4367c5615d10c557be3c1be08c45f9c4a8bea1080a1ce08ffcab3f4f9cadf76200451101fb556c56d5c4daca0fec444e706ce2922229d6ce96c3f952e69f2947c5a40452be04698ad8ac3fef411ec168ffb00392d26015808b3b15fa4b7b5965caea2aa991a15d5339b2b47d7bc1848ee80592c264964403057260c892c9ada0c93fabb4e93a4a6076d3e30e2a458939cfddcd65a559df3ac52c4bdc89dfcf652a0e46d1cc7828b9a29a4c94d625e4b444af5b0c8cb6ac66e41", 0xe6}, {&(0x7f00000049c0)="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", 0x1000}, {&(0x7f00000059c0)="699704118a367d74a1ef8ff6b7d37e02f3016858751b764123ca2c69aee455501fc463b24fd8b2efa8bbf5fce156d84e25ded5eb5263f0bd1ee3416a9ecd5c7f4ec89a657aaba66f", 0x48}, {&(0x7f0000005a40)="af72fe7a73ea19d5ff369c2c5e717f6832f831f4", 0x14}], 0x5, &(0x7f0000005b00)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x401}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x88, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x8}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x101}}], 0x50}}], 0x5, 0x20000001) 20:41:13 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) mount$9p_unix(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f00000005c0)='./file0/../file0\x00', &(0x7f0000000600), 0x840028, &(0x7f0000000640)={'trans=unix,', {[{@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}], [{@smackfshat={'smackfshat', 0x3d, 'mounts\x00'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@obj_user={'obj_user', 0x3d, 'mounts\x00'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfshat}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x37, 0x32, 0x63, 0x34, 0x0, 0x38, 0x33], 0x2d, [0x30, 0x38, 0x38, 0x64], 0x2d, [0x35, 0x62, 0x63, 0x63], 0x2d, [0x33, 0x34, 0x30, 0x35], 0x2d, [0x39, 0x33, 0x63, 0x31, 0x37, 0x36, 0x61, 0x39]}}}, {@obj_user={'obj_user', 0x3d, '!%:'}}]}}) copy_file_range(r3, 0x0, r4, 0x0, 0xa1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000002c0)={0x2, 0x80, 0xd8, 0x6, 0x2, 0x2, 0x0, 0xffffffff00000000, 0x13840, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x1, @perf_bp={&(0x7f0000000140)}, 0x105, 0x8, 0x1, 0x1, 0x7bd, 0x1, 0x101, 0x0, 0x4, 0x0, 0x2}) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000540)={0x320880, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240)=0x0, {0x8}, &(0x7f0000000280)=""/244, 0xf4, &(0x7f0000000380)=""/239, &(0x7f0000000500)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) perf_event_open(0x0, r6, 0x3, r5, 0x9) syz_open_procfs(r6, &(0x7f0000000040)='statm\x00') ioctl$FIONREAD(r2, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) unshare(0x48020200) 20:41:13 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) getitimer(0x1, &(0x7f0000000080)) 20:41:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x238, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x120, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xd4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:41:13 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x38, &(0x7f0000000040)}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) getitimer(0x0, &(0x7f0000000080)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) read(r0, &(0x7f00000000c0)=""/4096, 0x1000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) [ 2385.169506] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:41:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x39, 0x1, 0x70bd2c, 0x25dfdbfe, {0x2}, [@typed={0xc, 0x3a, 0x0, 0x0, @u64=0xa8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x20008000) 20:41:13 executing program 6: ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000340)={{}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d9}) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x800, 0x40) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pwritev2(r1, &(0x7f00000013c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)='L', 0x1}, {&(0x7f00000000c0)="3ecc1a07aef85a00a6f1f8d88086bf", 0xf}, {0x0}], 0x5, 0x0, 0x0, 0x1) r2 = socket$netlink(0x10, 0x3, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r1, 0x0, 0x4000007ffffffc) syz_io_uring_setup(0x347f, &(0x7f0000000140)={0x0, 0x9b93, 0x1, 0x2, 0x2d7, 0x0, r1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000080)=0x0, 0xfffffffffffffffd) r4 = syz_io_uring_setup(0x1, &(0x7f0000000280)={0x0, 0x2e3b}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r8 = dup2(0xffffffffffffffff, r7) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) dup2(r9, r8) syz_io_uring_submit(r5, r6, 0x0, 0x20) syz_io_uring_submit(r3, r6, &(0x7f0000000100)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x2004, @fd=r4, 0x6, 0x8, 0x8, 0x6, 0x1, {0x1}}, 0x3) 20:41:32 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 10) 20:41:32 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r0 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x4, 0x9, &(0x7f0000001700)=[{&(0x7f0000000140)="9b2e03b64187ddf542ef68699e20a3133aeeb14de0b03234e38909f36f44bb5690979e1d86a3c5eedb19624944de0564a9fe26a83987d2f8605260c672f88e6d5693e75e89de4399bd6b27e5a60101a1acae440b99a5835ea5c357ef6bfaf9652156e986c6359b76d5743bb83984483536967b2ca4215c7728dac8c701a7506fab008879816cce8f0d21f13c08021ac42d0dafba6635e827437896c64d914acf04078a3fa25565fa54b50aeccdceb99a029411e15db6d9e093ab8f6905a1ae3b", 0xc0, 0x100}, {&(0x7f0000000200)="fc35e3c450fd8aa4cbf57ea8edf578b7eadc0c5bf84e55c90f957f07337e082bde5a622552bc9c601b26460c96b5d37780bdf07b48bde5f7f8c942dacd5579a4033e415c00977995a73635878597c2c23e6a72a44dc48de53306bcfaa4ae23322ccf289607744732a4f0f6d4a5e723ebaf88e825727c464ebef45f52fb6ca26226eac42f8135ddbee11563e20a85f64a42f8b12e1aee8e9a093c974b8ca5435658c86e45d7a9ff6f230722953cbf21dfd27cff6199e36a7e1ee6ecd4578a316fa8e3022b12964ba6477bd9a32c978061f018a40aacc7c6588e9b5684e10b2a7855c9e886973457150a49", 0xea, 0x9}, {&(0x7f0000000300)="fed8a8e7454e7b8a173c5b51978f8163fd929f1dc21838a90e5587af9d7e0c97b74a6a9921fc2f0512fb08fe257a0818f4c16c1d55a063963b5f52c13bbc9b59b692abd70e20a86e963b387602af0949d22e6010ba4712c78946ba0fe9f8d419e77ca0dc6d1b55e11678014bc66506e84d62bef8455acca22880bf6b4c7fdaff76e20924836c86d9b606fe003f0bb6125afeb67bdf726e9be6537e69c727106e44836c2441d10cc19857ebbfffc8e6b3ab97d1d12d297d4c571d477ec188cc604b38b3", 0xc3, 0x6}, {&(0x7f0000000400)="c55b2b9a3b411bc0de67fd8c69a5c71f73a650ea84cf6e55fab97fedde8ea605b7e6c554eb88d6bfa50b4e73749c9935fb0740b0eed04535e380fd55adfe900f738ab01e969a7c375cf11c7ce5f7b6bc5eb8c9c06a4a2bfe3aef8c6e19c12290c1553eaaa0fdd4bf4c855d4f09dfbf7830f02668f29fde4253b7ed59a8eed6deb5b8bb8f72a6458460647211b4", 0x8d, 0x81}, {&(0x7f00000004c0)="b3d7d00e4c7531b4eebf413bb5d3f50afdaccc9e6612e74b5fbe66f7c37e50e2f5a95a0d4e0e6a61222fb33d74775e34619b34c5c0e388ac1fc39db4d3b78c7402d6467361d76b37dec020d3e36c2a4eb0a083039ed77843f61fdc8282c20650264fe4965e125c830852c2f6a2f3b49c88e23f274860dd87041533ad7e164ac42a40325bad4c4b5e051a1bdf48b3106f949dd630973ecef4f2890f3ddd1097e43904d9939ae87db133e5c2a14b9709b63e8b0c8c7f6c79b420264c33ac8ff1129aded1405b9b9bcbe38b14e8e938684d4c5611d03b33b5949ac5bc59d59f9bb8a1de6c144bb5dda435445a3c1b9ebebc8864d9880e0264f22dc518feda1b53707eee6ba5b3ee9bccf7ac4589a2d8f9582b52f49227851e400a756edeb9c16bac546845ee9a9517fa4667bd8b71cc9644a462c7b0adb2a4a6c174f1effa0fd015c60d7342e569521fe8583a9f63dc005ea262e700bb739ff47e98d00acbb78512ca517cf01ff3b88ebbf86ba3e888ab54b3e54829f12bb58504c7be0e767df32b7e9206c394ce39948d021572b93529a4c2e0bc12ce1ce831b18383e206582154f200c11801a4ff674bde480f05c3c4427b0ad607bc1734d4cf7b64832917f754eff18c39c5167aba42e68277cde8d10dd27845cfccc54162eb563164d26d07d6a2471090be1ac25c9952ac82adc127717846eaba87c05277d9314c9aed0a6e03f16be5d7debb00f401a14fc81d70b5cfa8dbdf882198e5528955640f4a0c22245765428000404641d0cccaad8959be3f6ca1eda23ea375d7727758e3f3646b7586f719b50a55a07a84762dac7e6cb616992771e6539a24a313da6a9134be75b33573713376ec278db3bfd485dec0c182be97efe302073f184c21ef2f21386ba0fd0ef297385b8cd7b4b8053286d4b254c7b358c6a61c7b58582ab6e92945a92b7b08541de93954c6f2d256664e31a6d2f5750460ef79e7f6872860cad10c14ea925fa1351a199b3d2691720677deb480372e19d499a39d7ecf7594008e18acfb4e04d4f31b1823467c06367917e3dc9c737977a8ce8d0eb4e5a990899345a5617652da84a30572865d9cd29732f6c1ad8efdf764435770211b4dd4fb580f8250ad791b3b24bc64c8dd9e3d4d47b25a6f7b68367db4b6d5e1078d25a04c2412601ed8b538581c48aa1bcdb37481b120f3da607f27b76e48cd3f9d7507c7d2dd340504cc24d4ef671b5059640d692e17a1062a0599b8942c3103229d8e47496d16ea03868a791a01868009ac61fbb87d0f02c5be9f49dc024e4ca5a7004257ea79623af63e30f93c63b092ca1ac52aa44c8e62090f90892dd25fc3dc221ed443712372662453a808a2eef2cb48537c60c7d0db899260cf9e9f05e59fe8846a0932123df1ada3d2382b81e5e84d36b7bd6edb0a16a210034ad5c900e93dd13938ce9c3591784ccef459932eb9954d5887216c4c59979cd7da4102c11ffcaf294bb09e1b37bd7bbe11b2089dc5a2e42a1c55c9f349e801651f501f0e0310bb4f88fdb68bf9f49776136f33b310d36274968ba609933df9ab9321dc6868a07ef0b5115fbf375de3b863496e8f6693787da1860fe58deebdb942f170b468ae1a8c526e0648ab06daffd5fdfdcecf26e80689d9b7d8a5c42deef174fed8eca0c5672e04071c7ac8f5e95786c57952266df86d83a0d3214ad8549d4f3d1b23ffd93bded9bf00967ffcb817e1913448bae3df5701081355692b93c054c4de22ed81bf1d5ed6c272c1eeeda753570a1726bd36bfd0e66a0498ca1e2b905638ce1293dfe238772f2800db64ca3ca72066386e780c2e44a19581f234c47b82f3f98aa261431a800d8274b1371501d274c897da63a982deb7efd161183ce1289c9e53ba90256a599de7640025ab9b5756881bf498ebfc762d34c881a52bf919c33ca31808d60cdd818e36426b31f1bdafff9a963f9e440f56247bb553da7e97438bbea2fbce4f002b20b1ab2182208fae02af6074fbcdd73cc65fbdb0e0dc8a236e1c4bfb66a7b26d11fee075990d41b14d6e51e65b0864864332363db797243a811af84a2c72886cf8f5394070eda8a1288d2df0dce404c5994f1329e91a032fc2900351f641048f9dce832d1a405e70401da6fecf20239461bb9ef03bf3f9ff0b597da7af220bdca835910682db232053943c372b719b803fb98a09362aff8343840cb2ea2fa0aac6e929fad6b36e4e3c4c07022913f50a9fe24450d61ae6725d4c02e496bcc0d06593a49944bec711ead40a77ff0175703ff7684afa759b40935a542d67883208a6809675ffbe27d2598afca029425937182a0e1cac34b3ddabaec4e1ef3c5f47149f39c606e21b5ce56fe9be50974349142217ca72a22f92bfbeffe971b159d0315ed6d01f14909af6d191e1860cb145aa0aa974977575aa52cb5f06f8bac89ce427ea9a8726268acefa989ad03c57155bb5ae7c31e0a111504319805fe32dafcb734ee926e7e8d355ab968d2aad1aaa53cbbd75a118194b100685d402d63c9d5d57a5f577006d4c257851ea2b4ff52c2681892e55bff746202cd01b11eb7132ff3b71a1ebc85e483e276463b3f342f614f27de94f9b92903bbe0c2561ffd567cb8dcfeba32e25fd981b83c2b47c27c5682fb2cf2a9af696237eb3ecaf76319d711b5b3387a296027802d3605bab2ac88999b45bf082b2205dfbeb40baaa50dcacc961231d7ea97b7586126d64cef44f1875b876a82f7ebaaf9fff0e29aa342aad1447c366c9f8b7adb356eae5e8df8d99b20401c939d7cd3e0eda67ee648e3f7cec75db6555257444e90bfd4a0811ec17997bc5181e69b14970f566ead16878c606d7319cc08fa4c0b0b7144d3720f40f88242fc6b00a57efa0a6fc35dd1a2ba934405682e3c966ba62ece0dc675d80cf94945d8d9b3bef671ec37e5db3bcee2160c1f91bfe6120d34d1dacff16b00a8113655bbbeef721d841785ba5b882e0c5971f9729ae0bd2ade1bddb45849437226a7d0bdf9d2d305715c332e4c059cffafa3534ab4dbb4a2a60b5df5d4bf67057fb24925d8725d98785b5bd90fb56f0b2b2948b0e5fd0ef6d64fd1554b0b4f0bef01a383e03f006c8786aa929249e59e2bd0ffc346f40698eba16fe0f9e1b7421165f413801098c1102e0bd7218f0860e2f2804bff00b31573bae03aa489ca66a8a08220f1933d02308cafa3aaa4f258b516082a7347b4e20322f46fe2d1a7c9aded14ad3cb534e62bf9929c6a7085152e5594343564b002880822d09e623c53552a8d8ccf78d1c311969e59ba40441a8ba2e1b83b32509ea00b994bbb4c817a4d0ddf3dabd0fb163edcd7d902dc57b7ed0fd8b43a3c14dcd6ecfa309bf63d6ab820cc1b042f91cd933b6c0b28222f18ec860f50b4dea53a9a800ee81daec805184298bf4a294dc76fa7bc7cacf7df6acc89c0f5abccf6300ece969b0d3f16ae22f9be426a0ef0cad798a5f152917807d8edbbe67630089224c3b1e2650ea0789948c3a972b0564e742a7c675413c8c8f7d49e7e3ce04828fe5633b689ce0791fc38a19867211682c437b69aefa244870cbae26a0b895a95636762fc92ff9689b43c708b226ee2aee204059f13257c791e2a13713cc830002b8aa7f11a535a10456e6227d1b248a0f02e7709197269fb1ab2e0e2ef16cd2053c17b4edad911cdb237f473aed646e7ae066a365232d8f1e7c0279b36a61d0621b011bb4b021d504a2ffc43c4dfab1ee736a048023ea0c0aecd88fa47aa8b47ec61492270f03f2852325ed90473c51726c275da23ec80ee1137e458a56c3672994a77bdd7ad9fe0a112458fe52dea8a578478e2133b3b70202c7c59232739cee6b55d0e3a9613aeafb99ba5b9594589ee57e20df7f20e402bfc93887537530c49d2104116cb19388b410a76e09a88b0844a2f337bf8d922cb44e997856617ecd2a58cf1962eae2388a04ec2991bf5e22c1dfa0536889db25aa40fc78f28f7de5041f50f80ca779ddf123d9391c599503e3751c97022b43d02c5aa613884c7bc5be0691b82d3e9029bacd3e2761c28fdbd037525e3cd21c6d3ba6277bb53c85a0aa2665d07f9fc86defc6d54507b8c390fb45c8c3bc0173ba5de6431b884e233170a174eaa3e8205fb3c5a4863296dacde7abaf372c51acacb43fa9a0b55027512b01e2126b556ddfbe06590299072655f71137a8a3f658cf089d67fbc0a0ab17751b504e85095f390ec377088b4e4cd0a42b0753059aef034af0a50845e93d009fd400facc0072692b4abddb1b2fec2b4064ecd48f635e5b24c46b633d6da978f1ae53c729296fc2c798753a67620ff857896ef931e2687113486b502a1be2aa5de005f13e701270b2e5d8277d5776bf8ccb9491349936f727d807a83d9fe87a661fdeb9787b4b075b45e01924f178be4128b48cdc75ae5cd7e06ef7bd0a19c652ff018157a56e603444584d6ae02aa6e1041797284731aa0e27d9a2c808bb7c3a7b566df85d06c9a180635e3f125e2619e0320b10429acb8ec1f396f2059b17e59b985dc9482cd02cfb7a970524cb07b8ce66053ffb74e9e137bac3646a6a425613c5e7ca78fbfacfccd9b5f6718e1f82799c743991134c129d68f1b03fcc12e437521656f72013283881ec44975baa27fc773ec3dae185e870d5139e835981d2bb4267ad8e6d70807cc3be42e61321bf80cf877be02b718a8d2aa7ad04517a4d286d175a6ccd640acea400e482b9c8287dbf85122372d139ea6c2b9dae1b13e191dd0043c721ea07ce461151c9a72d1c5a569d470ba7ff56f4bd377ba3bea31710411776bfad3960c40affb61b2ddaa5f353690a33ca19a131bc4bdde8c52fc532fc243fa22522cee860f6fb5d0b9ef1571358993c2d32244894ebabbad71c2caa996049a16c5499cce9555882e16b4e37f9d52fe6b5687654762fd38bc4762d1e9fe5a5086864afb77dc17c27fa66871ed681e93e3358e112e861031aa3fec0f664405d59f1c611b7249a878b0db4be946e7e6703a4d452d2d9363d6ce986ab090ee29431ba9f8c41726e1bc5d850920a64e55e065d760de778845eeefd883d10ce5590da193a350295b6f6fad4f5a5547b72b24a6f1854b0d6eaea2283589c28788b85848c9d1cf7c6885b8ad95b78ce656c63a22346af7332847ffa4198db702180c7b6ce6f97cb2e249a8a9c162c850a73fadf30c182cc14351a98c58abaaae491d91ca47dfe79593aa253a851fb59c330be75994cfbd5919e95e4d772bdd0118bd4e54389770462b9dd24791844e13776d6f8fd443507c3a6607148346b4fb9517a9e46eaadcea1e110fe31a67a45b5c72dd6b2778b895945c937a334e1de8ccfdfef08d5d9447127736240bcdff3017483f8257f88054d16a023a2f35056f138c794d3d1d0cc69de5a0873a255110f4edd081a9cd74605d7d985072f6458f22e5e59002c43e69c6ff5ec0e7f02da8407e6a4272cd89df346f6c30db82cf86bd26ad35d9750d59c1b8245ccab5514673c66660a750df10b640cb40bab17ba3512fad112a3c37231746a931c0119abf79c60f32858fdc273dc29eb05e93f999d65dfc8433b9027cdf9b8d460ed08792ff6b44beede686aa5f6e8bd6789e2d85907f8df60a11b41e7e2673d11f4cc136e58977ce5997d353bdd5c9bc7902986f9ae3684315d0840077ac18d4ced27beb9c38545b7e81b691a7ec9d62ef6d8766af56952f98060eb7f55a3d5d6958bf436260b0d222c1d6d301ce14b7e6d6779544a16ef4cbe4c725aa699828ff12b4a2b211e", 0x1000, 0x7fffffff}, {&(0x7f00000014c0)="7fa1c0f5f7b456466cca54540881fed3eb8e4e3adadc6d91b2e23f2b48a089", 0x1f, 0x10001}, {&(0x7f0000001500)="6b39e3fc387bd10477cb4d9b77d3d50fa8b06a290cd9876bcc78b564f6fb6e200696b68060262ae5059eb57b9f941958471f8b3cf68f63681b5912e70088777a2d5d5a927869d7fde0ab3eba0c4faf4ee097eb6611b71b3b2dfd168104b57b41e90ad52ef30181c119df584744bda91b260f144dc667dca9d6ed65ed94350f65ec7d65ac5ad668f8b2f31634f9f48d6745b42a1d752213871706980b5092e029c2b56274a4bcd2712829509ca7286a039ff456f28915397b4793669c800b0c4f969a307f260d405b64c34f9eef2a42133382c60f19bb18e1", 0xd8, 0x4}, {&(0x7f0000001600)="6467a918c7280d3b9cc6f9e676bd258b09bef754ae9ad1b9a207cd6cdb09b9cc75668b26b152bc02c955cac277db9dda8657f43e3013d89f74f7c8223ed33f67a8e0787cd30867e2fa0e228ac4b3d40488bdddddbc5739ac311469f7a8aafeed19858a0627abec7b71e71d3396eee72c9ea605fb4ed86e2de5b60da4a98d77230de6306d888294fce8e683117ebd6b1b86b6f7fce093ffb68d6d30998d5a3f8ebcbfea8246c231faf8abef995c89f42837bee93fd98983c16ee2f18db399d9", 0xbf, 0x8}, {&(0x7f00000016c0)="2df674752080c80205decf072a20086b8d7a39fb0b01", 0x16, 0x7}], 0x30c0881, &(0x7f0000001800)={[{'#&'}, {'}$,]&'}, {}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) clock_gettime(0x0, &(0x7f0000001880)={0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) perf_event_open(&(0x7f0000001a80)={0x2, 0x80, 0x4, 0x7, 0x1, 0x40, 0x0, 0x3c1, 0x8000, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x4, @perf_bp={&(0x7f0000001a40), 0xe}, 0x40011, 0x6, 0x5, 0x6, 0xffff, 0xffff, 0xe6fa, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x10, r0, 0x2) pread64(r3, &(0x7f0000001940)=""/45, 0x2d, 0x8b) clock_gettime(0x0, &(0x7f00000018c0)={0x0, 0x0}) futimesat(r0, &(0x7f0000001840)='./file0\x00', &(0x7f0000001900)={{r1, r2/1000+10000}, {r4, r5/1000+60000}}) io_getevents(0x0, 0x101, 0x3, &(0x7f0000001980)=[{}, {}, {}], &(0x7f0000001a00)={0x77359400}) 20:41:32 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:41:32 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000540)={0x320880, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x0, {0x8}, &(0x7f0000000280)=""/244, 0xf4, &(0x7f0000000380)=""/239, &(0x7f0000000500)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) perf_event_open(0x0, r2, 0x3, r0, 0x9) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x8}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000001c0)=r4) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f00000005c0)={{r1}, r4, 0x12, @unused=[0x0, 0x3, 0xb2, 0x2], @devid}) sched_setattr(r2, &(0x7f0000000000)={0x38, 0x239ec4252c833e2f, 0x0, 0x20, 0x7, 0x0, 0x4, 0xa0, 0x3ff, 0xb157}, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x100) 20:41:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x238, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x120, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xd4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:41:32 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:32 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x501300, 0x28) r2 = signalfd(r1, &(0x7f0000000480), 0x8) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000004c0)={0x9000000a}) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xf}, 0x240, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) listen(r4, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ppoll(&(0x7f0000000240)=[{r4}, {r5, 0x82}, {r0, 0x8109}, {0xffffffffffffffff, 0x4}, {r0, 0x10090}], 0x5, &(0x7f00000002c0), &(0x7f0000000440)={[0xb9]}, 0x8) clone3(&(0x7f0000000080)={0x1040900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x10, 0x0, 0x2000000, 0xebe, 0xffffffff, 0x1}) 20:41:32 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2403.837114] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2403.848403] EXT4-fs warning (device sda): verify_group_input:170: Bad blocks count 4294967295 [ 2403.848482] kauditd_printk_skb: 23 callbacks suppressed [ 2403.848500] audit: type=1326 audit(1705351292.154:1088): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2403.868962] audit: type=1326 audit(1705351292.163:1089): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2403.892427] audit: type=1326 audit(1705351292.169:1090): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:41:32 executing program 7: ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x2, 0x0, @fd=r0, 0x3a9, 0x0, 0x3, 0x8, 0x1}, 0x0) statfs(0x0, &(0x7f0000000100)=""/67) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB]) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3a75, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1ec}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000000, 0x50, r0, 0x10000000) syz_io_uring_submit(r3, r6, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x5, 0x6000, @fd_index=0x9, 0x0, &(0x7f0000000280)="2044135dcdbc16d7255d87b50b8f88c1582d159b9d43e4277e4d97335f99974b3f9541c857efd378d77a79512848cfbbdd5cbf04b0f39ffc243313d95bb419629effe2dd3731b1e0c11b1bb3363289f6d590350f2498d5214643ca9ffb75197c3698c825da9889e5120dfb44b24ec22601c64f2878c342c9380a91a9618c972e7e13479feb776e18c8fbd33ef747561f80315f3cf98c6d5d90b43368b94b893443229dc3792df979242deea70f8ec7", 0xaf, 0x1c}, 0xf5dd) sendfile(r2, r0, 0x0, 0x4000007ffffffc) r7 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r7, &(0x7f00000000c0)='./file1\x00', 0x0) [ 2403.903670] audit: type=1326 audit(1705351292.169:1091): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2403.948296] audit: type=1326 audit(1705351292.252:1092): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2403.962285] cgroup: fork rejected by pids controller in /syz6 [ 2403.963858] audit: type=1326 audit(1705351292.252:1093): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2403.992098] audit: type=1326 audit(1705351292.253:1094): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2404.017344] audit: type=1326 audit(1705351292.265:1095): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 20:41:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) [ 2404.049808] audit: type=1326 audit(1705351292.266:1096): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2404.069855] FAULT_INJECTION: forcing a failure. [ 2404.069855] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2404.072360] CPU: 0 PID: 19145 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2404.073717] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2404.075384] Call Trace: [ 2404.075903] dump_stack+0x107/0x167 [ 2404.076623] should_fail.cold+0x5/0xa [ 2404.077376] __alloc_pages_nodemask+0x182/0x600 [ 2404.077741] audit: type=1326 audit(1705351292.266:1097): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19087 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7fdf1089fab7 code=0x7ffc0000 [ 2404.078285] ? xa_load+0x12d/0x2c0 [ 2404.078305] ? lock_downgrade+0x6d0/0x6d0 [ 2404.078323] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2404.078364] alloc_pages_current+0x187/0x280 [ 2404.086502] __page_cache_alloc+0x2d2/0x360 [ 2404.087350] page_cache_ra_unbounded+0x207/0x6f0 [ 2404.088246] ? read_pages+0xbc0/0xbc0 [ 2404.088944] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2404.089799] ? perf_trace_lock+0xac/0x490 [ 2404.090580] ondemand_readahead+0x8e5/0x1150 [ 2404.091415] page_cache_sync_ra+0x138/0x170 [ 2404.092211] generic_file_buffered_read+0xc8e/0x2920 [ 2404.093169] ? pagecache_get_page+0xc80/0xc80 [ 2404.093998] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2404.095027] ? trace_hardirqs_on+0x5b/0x180 [ 2404.095838] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2404.096798] generic_file_read_iter+0x33f/0x490 [ 2404.097621] ? __fsnotify_parent+0x488/0x9d0 [ 2404.098395] ? iov_iter_pipe+0xf1/0x2a0 [ 2404.099106] generic_file_splice_read+0x455/0x6d0 [ 2404.099969] ? pipe_to_user+0x170/0x170 [ 2404.100670] ? _cond_resched+0x5d/0x80 [ 2404.101360] ? avc_policy_seqno+0x9/0x70 [ 2404.102081] ? selinux_file_permission+0x92/0x520 [ 2404.103006] ? lockdep_init_map_type+0x2c7/0x780 [ 2404.103954] ? pipe_to_user+0x170/0x170 [ 2404.104671] do_splice_to+0x10e/0x160 [ 2404.105428] splice_direct_to_actor+0x2fe/0x980 [ 2404.106263] ? pipe_to_sendpage+0x380/0x380 [ 2404.107106] ? do_splice_to+0x160/0x160 [ 2404.107826] ? security_file_permission+0x24e/0x570 [ 2404.108834] do_splice_direct+0x1c4/0x290 [ 2404.109566] ? splice_direct_to_actor+0x980/0x980 [ 2404.110505] ? selinux_file_permission+0x92/0x520 [ 2404.111371] ? security_file_permission+0x24e/0x570 [ 2404.112354] do_sendfile+0x553/0x1090 [ 2404.113046] ? do_pwritev+0x270/0x270 [ 2404.113806] ? wait_for_completion_io+0x270/0x270 [ 2404.114653] ? rcu_read_lock_any_held+0x75/0xa0 [ 2404.115556] ? vfs_write+0x354/0xa70 [ 2404.116228] __x64_sys_sendfile64+0x1d1/0x210 [ 2404.117093] ? __ia32_sys_sendfile+0x220/0x220 [ 2404.117918] do_syscall_64+0x33/0x40 [ 2404.118599] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2404.119519] RIP: 0033:0x7f85f7bb8b19 [ 2404.120193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2404.123397] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2404.124842] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2404.126106] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2404.127490] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2404.128845] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 2404.130176] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 20:41:32 executing program 6: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x38, &(0x7f0000000040)}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) getitimer(0x0, &(0x7f0000000080)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) read(r0, &(0x7f00000000c0)=""/4096, 0x1000) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) [ 2404.353020] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:41:32 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000002180)={0xa, &(0x7f0000002100)=[{0x9, 0x9d, 0x2, 0x100}, {0x1000, 0xfb, 0xb3, 0x1}, {0x5, 0x80, 0x40, 0x7}, {0x0, 0x6a, 0xff, 0x7}, {0x9, 0x4, 0xe1, 0x3}, {0xffff, 0x7, 0x9, 0x1ff}, {0xc000, 0x80, 0xfd, 0x8}, {0x2, 0x7f, 0x7, 0x7}, {0x1, 0x4, 0x22, 0x2}, {0x0, 0x0, 0x0, 0x2}]}) getitimer(0x0, &(0x7f0000000080)) r1 = memfd_create(&(0x7f00000000c0)='-$)##\x00', 0x3) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000100)={0x0, 0x0, "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", "ec8c154cc560813995b18ca4d9773e79cc62fca75cb7044778e033b503e80cef0a317625a09edcff990bcee4d95d22a34895799fe204a139d52116a973067ecc0be14e844c4c581bc5f0b95d33cc79257b352a6fa039d34adf9259cef7a36974f0bb9f0e6a55bbafdd503a1eb60249819de11c6aea5294f3265c8e92b4a59ab9e3d1b95eb2d4f02dc5c1741967fe0fb32b7d5c0df1c65f107280475b2102f450f568b1e62964bc6a676fc87dfdc7c2f22596d2c1ff5c7ac75defbed99322dd7913f1a9f6fe8bb91c28f954749feac72c0585cf58d241532bdd61c3e483f9c17f190cb8331329410e5e50aafa83ef0305619e89cbbd5252cd0844deb6dfa14337b8fee975e24afaa9b4f46fd5751075ec9f1f040b0fc749518d73149f1625c229daf2559149239ff5cd8675fd26f9bff8211fce29b77158f58eebaf11f32153c2c5b280c8630724dc0fe119022d30aa3cf30cbd6daff4b3fca2616ec6a2e0fbe230d57910804a8c2797c77a1a46b353b192db89ff5847eeeec9df47d0c58899c35ba037781e85e22a754457b18dc637920f942fe3a4b6ba31ce242a6de43ce7ceaf0ecc069298d8bb5bd2d2496a728d74c8fb4164ab43f6f52435088b0dffc40123f92d1a34ec9b2375f79f04d3a8bbc08366c66bf6256e1a9b41cb6b2f94e4f407c2820ccdd5013162185870ec2ca1606ce3eb877c082293caf5e632484d68c01252d1d14e8750bb3e92664475bfe66c43578f0a506433b4ad9c0b953145d8f37a279c89536f4c5ab289da5b8c48be139fcc6577eb4ea8f59632d4dd3059ea0057b67c17ee754caffb11795add1b877b34b7fca6acc47b2b309d5f2bb26e8a97c8095982cd312e48ad2e06483ee159c8442c7cd5c884910508ca7d7e0252a35ee209002a9e344688fa98c4202ee72be259d53f1a7cc0beb84b8ceecbb80c9342745e197c30fdd27f2287825e395d616204da7d6c4065e3b74eb5a1caecd4e67e2f680aabba67f3d4465e54bf8d578061e34064186dc8dfc27f038953aa6d619e913dc47840e65233dc0f5b32693f480f7264cf73d22ce673b2aa737a73e17c96c91dc914ec387389039372e4fa0a3f8d56e513d12dc84eadabfc6bf9665339f95ded4d8d9609805bae0210ab80f971dd79497f6fcaa79b29bc756d5e554ec8d71f57ff78a12d5c0645412d58cc335e4b9fe0813969404354f4d9c759fb20523f7a1d2cdef1a76e2f209f72d53b275b2ab6cc15684a1782bbbbc2ce1d6d000a33ba9abec6f968795e8b7dc8a477c14bc57db133b89cf72ad574a9a9b74281aaf195da9da221a19cce99658e1cfb6248874f32cbc971e4f974e1904d253e354091387deafdb6cc8d7a7fc8cfe77d40857859b96763f3a855bcb38d2f1947271bdc011ab8839e4ff25507d7b5171ae1007133c121692efb172058067d3f6e500ef71d3e6b620baae8424685f3ddec005545920a817558e22e97bf0c1e7fe3be0b628784ff47bdc9ecc3a54a013fa22213bd5f245843b204241c9d796d403f64ed79a0fb554d44cbd9fe4214e55a8af7af34bb0adf7b81c3c026fb2c7375a534f4719d71b1d0c0b9fc81e65a1d3d19e18d95960a277c42255c1bcb2b35a31a141ad552535568d896713444961e5b652c13a9001f12aa15a15d1091605bf8fd61c2a27bfac8212ee8a625e6ed0486d3c9fddea8918149679dcdcd6bf990418b86fa1090a8b599fa9f2da7a3e8d98b0697fd85beb452b38148d29645fc46d13a219f68825ae406983a30505477ad5d01730975b1413535435c073ee1f5a26d24ae2475cf4d3e5166017b3aa8db64b79dcfb312d29bababc8ef6237f7e74fe0b2d27f85ad9db63bdc4bb774f613cbabd7641feea2eb9c6d0f9d8b6bc72e9eabac04c1a5fa249c992a0538002bf9acd77f88745fdd706e287a2b3e8ba9b58e583b078d7852851ecbb4f44dc3b96e106d80e5c24b56b042df980e67a77e5253849052dbeb82e497bd86c3800a1edbd7b59c8cf2931ed1c2201074c02daab2f473aa2e043301ff98b4d771a8a351bfb9272c5cad6182fd333162713c9affad46ffa6250878fbd46f72f1d5cced6cddcecc68e6b0b1dda611ffb17d5be96a7105468c11cbb8207c7b4c1bfba75e140da1be9385e61c19b51380fdc20fa5f9fe2fefdfab649e4f4ee457d6e02ba1a370129ed06c3573a79b16af3660755dcaf600a3ecdd61eb8fbd986178566ae1ffc7cfcd20374bd83e1500a9e432086b01252d13d2f24121095b6e3abc02f392437c46b98dad75f4671b8ecb9442269107a9381b288d7f929e48d27ad3636d85109c937b59904d2083d4fa76aee28c0dd0d8eef42b8b4849cf56f800a984d20cf27f92f6a6a40f3a0fdb284ac2aadf1e848b1b171a8a05928e741f06ece97202428f0c7f6a5962bf3de17b19779898a4cfc4345e5c20ce4ad234cdf4ea5ef323f41ceb5fe134ba9f822351b2974df19719a281e8e083bc0204330fe99522b2a07f88cc6b73a0bbcbd8322690ed790b38be6f069f1f55276117e1d74169a3e8f592fe8402b8dd890c30d0984bf5a3ad969a34b29d24ca7dc61b5c34114e63071845a482063aea631fa0e27019aa4aecafde45990aeebf9fcd33231c98e415835ce2af832e87dc67f2633f90b297c440d488e6ea6a67b1224542a56df4cc0f7cce6c6c60d5ebdb9f522d49f49a69359a656c607d454dd816fbbd3910d7c2655782219b83c5584b7aeb356cc3089d34f09a3b902b3efa674a095fab74524ffbaa0b1731639b9f8eeae302fd9c99322b741bb7d1e84786f8d2b4445cad2f0ec45c5212e032b5441f6b24fb151366035206717648a17cb2bc1f3d841ae1d77618570f73f0571e74d217dbd4c6531f5e56505c5274fc769977d3bccb71e7fe02951c5df7789733fccdb7aa5e4a1239b3a63ee7a3d9fd2b27c15585e19f438921c1911a7468001b84d57b5a6c2c5ce68eaa4c728a4beb0f1805a3839c1b2f8c1451a801bd80032c8fd5dcb88246a31a5bf3ba7d5a129f62d9eb7bb74147976692c365e4459b84bad69c24cae05854a354426c47c56c0f4db34cc62f0fc5ab6cf1d317992c3c2d9e7d98b15511bde3f40acad058a84eaf56b8996c8446a4a7800a90c733178149b8ec705cb225ed760994758cb1b5504c8b281f20882cd4776ffc9fb085b84b4c41d8d41855893ed35b129ad12c2a00d45d418c683b7bf415bcebd55ef8f1083e4821c1f72e19ac64a4815637dc9b8f0771a87a64a64ff4cd4008d15893ec5ff367d0fc36119e468b5e969a39ec222cd6f453ca188ade2c3ffd98a7ca33048f39df5fe261d8a93252dad61259aabcf651e19e40d87f8d7b16f208404bccfb57b65eafd3d17cb6c2ab1c0520896771c31f2382b736f39a5a870dbd43e94d7bdf15584063f8ab87d9938c0a40590018f738a984536340271569a3075c5bb2eb48734938166c66127fdf55b6dd82f6dfc5471c5d1c65e4782d56c70a8d27b3082b7c3632208ccfc3d6563f444b65501901ebb1690eb59e5792e243181144f81e15253866c8714ed1206fe0a597041de53690991aeecfd68f991695c1691df3c8aec62da8bb789da83efcb3f1dc7099891c4739b06bcb57d98dffb49f2c624f0dfe2aa600925d67a3ec8dff6b7ded1064d4a67a5fa2b17a6d4b769923f2ec4ccc54e11b13bfef149ff29242509f18407ba60beb9c7e20e5f28a0ac9f32e22cc9a1414c6b3b61bad46e19a7448599d9e40f7cd50d5838f9ced9dc1adb2227e81df08f61bf03961953eac943ab3fc2b8d26790a3d1996e8da4bca63b44e9b5ace691912bd7f00adcf6c83fbf84e53cfe5fdd6578b4fdb990882410cf4a65fdf4076e2f2d7f13ad5e82a1b47b1bbc40a82c6a78e5622aed7ce175b3de902aa30abeb9ebcc24d8ed896f7ac363785855809652d62d8842df880137d8c60b3bc30315a13d40d32cb44e094728e206092c2c54177047ec71540be424fbf0743b90f871bd3d433a90d1df044509794292bde179f5a8a52c5211b8a3c1a5b8a9f1c02a65bb1167f4e78f83ab841a68834f51f174ca1b223a87bfb6a08b5ae7d18ae980a49baee2cad94ac3992572e8b1f2a0abd5ca286bc40185c6ba11321a345a0ec89fd335e9e4c0b942ee378fb5748ec0fa0aeb6fd4ae509c340c17eaa2de17d2f2f1c5f586a207b6e910c9da53ac6a74517c4bafab1fd58803b4b83750438991fca3cb334075e21584fcb2d5e121430c750039506748e282e6f43b22905f5a5128561dbffceb91b595fa8aae747295cab49a224484116b0cf00ac61503d93e0374351d9769beff1930afff3d2433e36b20ff6a130322a98b0bc0dea3a98ad8746caf1beae379f53e50395988e0353a809298806843e425fab75832693b0a56d24fc2cc592f01b366fedaaabfb0021a439e8dcec4b316e1d4e87d4cfd768f252e8e7c513ce5bde2019a3a90568a0598848222691f39e9778eb86c7920bceb8817917bc8649864f9e7f00572f138d2133b0505ea4aebe40fd85027959121e4a3538dcf490d2100ad51d633253c0faccfabeaad5274bf5e84060611c16669869e874e02bd880ae671905c61ce6f7bd5dd6385fc10a03098beebd45ed8cdb113592b2a759fab1f7aef0bd6d1cd7eddc01203238fe6c181965a2f5a4290b5e36e2842a1462b5e1c741c4803c83a8599e9062c63419a964c67788f9154c0ce778a31e7628f2e978226c0081dad8559bf65db80a0c718014d1e57621fd5fd28291ae8354f5c745c9d2cd1bf5a322b95d1835fd778a298f9e171d13b7836a370caebd52d594fcb0fa7dfcb2fee3fa62ef37fab418295fca9195701edf5bf2680cab5a690f63f5fbc59cacb5692fd65e2635f99698197146d80fa86a28bb1ab3bab2a924d90b027423fc3739373e441fe146146a4c857da6b37a8c053f2618e1d1d8a965050865c454f8899579f3b84ba286c373a6d083b295c1c7c485a7da3d8a3d5e4a5f359320a84f14201ca0bee8e424fd4432605e5745970072307eebc704ce5a31504e9857d63894d3340242cf4625dd289beece5d67df1fc1ffccbff9ad9238b02c03e84db1c3e7cfd8c443ab1efba96a6f7abef85d074a9b70c48c015b909b703e6ce7714eceec3fd5c9a7471aaced59ccf6191086df839c1ba20472f7f1f96c41c963a02a8d08b11eb7763c7a4be56f62cc352ce22416ac6e0ccd35fb9dbf407f09e70e0230e9562275f4816b60546393986a7a3a07fc572bed56690ecca21e93c5de0437f4451858d26715b4dc56e30cb5f84da5921a86c10c0d1b88d499fc5112984b01929ba6a9e82b80812b61f2872c995863ec71741b4185c4195b073d8b6256cc38e55f47c4ddd7edcbab700e9bbdda41dfe94d9a2396fad0072f59362027f130674f6c1ed662"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000001100)={r2, 0x0, "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", "44ee43a3846b36ce2041eacadcd554f3e8ee9cbc2f2b22b3228c795d11d3937ecc62593cf41555c8a7a30fb63c6b5ccf45d2ae3544ba97c1bb7020ba07f07f2886f453a048378e011b4194af391f87a6e427ce1b2b5a25cc063c8d13daf789a2d09898f8ef4a3881c28aa7248c4e71eec60b16e1595e88d8d5564d13b599ea955b1448bcf9c6c994353462d8cacc277dd5fbc96222ff73b19f726b6313d1a43e94ffbf9ea57bb10be40c5d7f0a230625b412ff84bfa9e191f7ad354817e14fb32436f16a9a12c207ba0dbfde5bcbc9d4f0f61dbd98813f2709c0f76266f167ccc8fa5baf789c3185653501e02321f9a85a6bf5446df758dcff13ebd890589ce491e7823eafb018eab955e9d037469aff946f6fc5cee55dbdfbba9a4eb64d4a70346eb2b5173768ae167958b242701a585ba45024e76524f08681e5ee9f890680653fa3b6649df0b8e9aca1870a730e558b58a0157112506a279225e16eb215bdf7fdd036ca39ac2e94ce8c99e2d41c11be834f4f0458bb486fd076fe613ef385b3172bd234e8b99aa24ac63d1faca2f321f78e2519aa9472d10e35ed8c3cae0c7cab01465f5317e1e04c6d422bb6d57ddde05dd026f93a526557d4c4212025ce907770b5a2290579e6ad5b85973c78d6fa859f1dc4f1dc0ff844099ec603d71c56386d30d77c299882e6f4456a89e462196faeddf343b6da42bab21d352b1e956b65dfbab69c23d0e56405b67bd57005a000e4d5c038613e9b9680ca43e8c19c9be5a79ba16256b33a22198f5d5829ee61d41aacc809d7bfacbfa9339492f81e37ec35f099b7af3f8eb87f2304c30ee0e71b1bbad2fd44ad55b7514c7b601f5344cefb2581a7e170ab125c02b7c3a5feab94b90061ededcfba0d2b9d6c7552e97417bf4465592062ec7e86b26abe0e3858624c6f8ccca9750bc205ce2e9ed528e77597d65da7abb0b466bd6e0d14e292334bc72da1841f1e1d6d5f4839b459a61575d84d1a5f7afddc0d7b6112920febd9a658ca142b01dad034c0101f81d1d4eb424298e38d8511435b1cd46aee80ac181f9b902f4a2dc90bed4a07160fc77962d90e5358a44e9ae6a03abd413b50d2a76ae99e63972e1a7d1bac1c97ca89943c926a7fe882401c4b5a74dc960cbcb292b8a23f1de18a5f7432857f81c425f1e9bd839348fa8f3df4aea0cc558d3a53892d31a3e7f193ae527991107ba1a79fc76a59cb6aeae7fd033f888893155fb4c2b394c90ade64dc2b456013500133da6c5d49d137ca9c044812c06d0d87cdae8dc43ca7a9894aa6e3d16d263b713e7478fb18b00d7d849222ac490f413df46080878b08e9ad11d342da472c2122d1d990048192674db3b4ecaa06411c56c6172964c5dca5d6a8eace530cdca00518c30205788db2cdc6a3259772dfbcc174f3cb79685c43770057207948a91019fbfc581a65fae3472c0e15793075beec8da459bfaa354c93f7b4f2bb645cdd660ae04918208cc7681114c8d8a0435810a1831adbaf2e71c492386055f93bdf6d2912ea00e87abc467a0d466877ef0866273f61979a77d7ffd4d2f8a7cbd5f77322a5b868e7e73f0ac27813582f0ce6eca648a0ac401a04cc298393830acb7054b1fa9a6a4f352c61929fff44d5bd6b79f094af870a12db0f8948c3f14654ff06a5059bc3b5d55f59c9d85f63f571e94a51258f94b6ebad522ada4a73f8c5706190382e7cac0dafcb1ebde59fdcffefc6217c6d4a04e37f541d6dc1174773b76f3f3a2fe9a92a36c53894685505779aae3e71254e74055a5c43d1662a65a17e91e95c696250c603ee28b4bddee756bdf3ab2e471f47067f03654a7c74c1692a1792a21a320dc594c691d4c26d1c76efed52e386a2e234b8c943e24888e9bfc529e48cc65d7493bcf6d6d6937d2a642a601a4131859018c5e91085fb90708effd0df8a1870eaf31b269abb7233640d114846ca10a2074b7f6d254093c074c7d66f80e2db0a2c289d44e875de0860a0d82d0644b33da96c16b7c007d184c35782916ad952331b520d6a4c7ef664be9be13a5a2f32cc669dc7f2071c51f074701391ea1990e96021d6954f2e19d3fb8bdacf1653ecc346b7ec14a7490345b22c0022a18edab71b3cad1c59657f828455fb851ecdff6b9152b4806c1c66d67c41e8d922b76c3eff8282deee657db03aa7de73f26ae3f56a397415c26a8e050a09798ecc3c33c9b1af5432b752f482b6dec0f02ebb07df0eb29b3db05f27ce4abc7c07b055e9ff3094027e6d6979bb68a580391db0052fb9b70bbc4ef64fdc263b7d255c725b97807460f1f725fe2b052e7a8c743849c2a5368612da8c76d78f42731b288fe2312fcfb49082ed183304ccd878f39bbe8a399ded2f7c48cad8443f0d0140f1459cb765b390c4066f4974ccbdaad0cc70ecaaf251e23d4525c239b60f04e012971ab3a5a88a6a1b7481fc5a5cb9da8ac6d00364edff19e3b1239f6ce08ccab1bd3cf872187eb3a78ed9031ea6f1b75015e4caf74b36641d56c6d6845ca18ab990b441f0ac7d58cb7f5b47668b3afeb24b2329add4adb939d87675aa096fac20e690021a0592d3a7096a04facf9a0b3a8638ac3104719f79693bf66e4d002a5ea5b00a4578d3d119b52c45e56bba78d5a45d048af0454fd493df5ce6376a96861256f5bda633710cd53732e32e2954a491a39d0078c53b739ac09530450c2f8f6a56873afd18e69df9934e7e2fc6ffaf32c465e799f772cb7602f2c9f6bd04b9f8321ef694c30510c5f53c6f9f27437177d6b57c4fc416bf97e0d7739c9c34e93c5be0c518eb9daf788acf4bfe55cff1b59f663313cecafedbe849d3c9dd9cb595f3f9a0a8d574f7eb11c4779ae7d17dee67a90f2ad985842b513086af10ca09833136d86198b45b811562b8beb6d0bd85f65109e2b499aabbf3cc5af776548f9cab44ff4223dbd30dd402507a1fc398e32d48ee2eacdcd6edbc97051c7128e5f2a2745a4d5dd61ffcee91f1f36bcd2ac93603bec5e4ef38ef316e2ebe8d71e514a3df8769dfaacd84ce863a5a29d4797b7d9069d2689dff11df40ab72fb65886e4352f233301730f6519e552074c8366e79092277ae770d6c444fca86df1be8af625967650761ec86dea77303136d0ae9b2e929b3e2ba54ecec30ba94fc9a9e09f84a156e47e914ea9c0e52ff11d57eabe29266d8f377148608cd436627e5b222e46e1ac396bce331dfb5214bbc795b40cf91e6d0251d3fd03051d279dad9161aa6cd5da0eee0f5cd9f1dee3180dd3bf62d2388ba9eddda1ebacb71bd9ec967d8399cfa934dcf0e2bb84d2814d2001b5fa00f31ff5c078df7ac41e3dc44d181d5dca0616ce1536aaff1da3df6d4c13ecabd99c091b27a2de6d272ed937e245ede0b27af3c1eaf6e933797fa69bd40bd083d50b43422198344f97890aa064abb0a7d9895fca50fa76a16da10457d36ecc01b745763d3aa816cedbfeb554bd26ee778be81f649c82c3ab229bb84feb5bf46b4ec4aacb5dbf5cbe2c5dfdd999a8060de6f8f5d24ef8f8b1ed05fe3e9a12b42a7f9c3dbaaba84d580cc545f2ea03fd5331c907ebf9171a7d486fd0966d7177687cc0712366132e524a8acde5076728d5ec526aad535e3340c9ff1f9bc4c50eccf221c21b6ae77d6a512ba8b65691a97d6f33c74574e5664ed06c9c78c8f7e073e6cb0c85d4baaf6748c1706b187950f5941b8077354f29fbb24dbcbadc2bfe87eebca3af2667fbce0778a4ec1de44700095fb59460dfb43488b30a3633ca95430140a64d6c96b625f928f70be4cdd684d3d93d710f626574649f2b06e9f2ee8536bc642d87cfd63011cf7816e63298e3475c1b43af3a66ffddfb35622759ca5eb378466e581b85ea9e0e849f6e4c963263b562957835fc3521d1f09b11315fdf14842f7fb23006fccca425a49710f6e95992cf3f2dab1d673d5edc927650fb9df56943ef6ccfdb6f79f0ddd254f867ad0ef320e7322e7108d97acc04b5a5f2476887809652a22cf65c734ee935b554937e491630bcb9914e5f712cb60e415fc293dcb30ec6cd55e32316cf0ac3eb1637559304684407d8aac96d7d47f0cc764a04011dd24b22423f18d9db6a4c4dc65b5db8bb91ae8331edacea80a2cfdd57294894f9a37202bb60eba48cf6ccb14e3f12aa75733e4f423b088a76171d9ac7d787f3df0de9dedd2982a263781ef740b88b4d8a896432bee3d3f13cb42ad2de627f507732e68d978e1ea72327b8054a8cc9b73a3155415f0f5a34aa589b3ed07b4da6f7942dac7583ce2c825546d1e93958644e807a28e174adc0fc09135312be2ecfd009d74469f965f2a389b964d8777604cdd072307afe0b2230c92e5953a671a9ce8e968eecad56c75455accbb3e9406e59cf8f5b6409fc4aa1e8fbf9efd42fabf3b1e8fa019e13956406ba0b94818b9bc8ac15e13a9e52f3bd3c7c4b5392f7d6b66a8b625a1325874274bf299262ac7ebe71208e731c2e2875a02f5b0ac88d2fc426792bed931945a0e734694ac65d0fea7e88d8519bcd881d55febd25350a1f205a3dddb69afc88e59e807e805be3086b044d13da9f674f5d4f940d7f2f653efcb0e15ff0b66c88dd5aa871d2e7c224e4d812aac2104128ed56e25d584bcd6ff496c81b77583851408f2661c3a4548b27f6f69320ea22e9236c4835671ff5cc81d6405068f34415d7e24bac366a1a4a038f344e3447e49b54dae383b39bffcc6325fc082b18fc8fc1af05c49bc75bd44f36b492c40e7f576275870c9ac87d6fee1c0f965820be21ff48f9f2e33976eeeb215d06613efce027ea67b59989fadf8b357be140b48f20c60224e3e8628618cdf8990c7b239de18c082ab1610aea2d0501134d84cf8f7d01bb5583ee8911935070d01a6a3d1435fbaf28842bde93001ea13bdecb74a29c92e14114f47ac80e87745206787ff879c0e66b06b8945cf0dab6368f52e37942b9998d6a68dce820c09b34234d9da0ed2b9d27ff9b1b7ccbc856dade1badc4de2fba08308c6ae642e322d60a567fe2be685e29ee395ba8238911d5c3ccb39c8661425388edf25d8045e618ff344cf470c9f2b51a0eb5ca818cfa1ccbdc52ff17c31ce02e008d4329fdc8774b07854da6e85cede63fd96e53687ce33a16822af1acb9477045f33ccbe05844e10af5e1aa3b029c1cb111f946e8c275c6ffc721a079e15f303d1f9ec8affd75f6df4be6cff9f46b889a5a0c4497548775a9d1faf24738c3deaaa16943fc845c8757711a31560db545680e250555497ad1a87dc2784cb5bacd15b77a6bbc2482767d1e785fc91f3c94a7ec518e7902d6bc29adf74afe80000d6965030b620b34a9ab810beee2e8e48822e5fcac4749c711b666e341d45ff662b5e82b673a513f3c79d925e2241e773d6"}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r3, 0x6, 0x3, &(0x7f0000002280)=0x1ff, 0x4) r5 = open_tree(r3, &(0x7f0000002240)='./file0\x00', 0x0) fsmount(r5, 0x0, 0x2) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r4, r3, 0x0, 0x9bbb) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000002200)={0x2, &(0x7f00000021c0)=[{0x0, 0x5, 0x4, 0xffff}, {0x5b, 0xc1, 0x3, 0x6}]}) 20:41:32 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x8) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) [ 2404.700934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:41:33 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:33 executing program 7: mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x0) execve(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000040)='@\'q\x00', &(0x7f0000000080)='\x00', &(0x7f0000000100)='\xa0*\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)=',-\x00'], &(0x7f0000000380)=[&(0x7f0000000200)='/]@&(-}}/.[\x00', &(0x7f0000000240)='\xfe\x00', &(0x7f0000000280)=']\x00', &(0x7f00000002c0)='\xd3)\x00', &(0x7f0000000300)='r!\xa8\'3[]{,\x86*\x00', &(0x7f0000000340)='{}!\x00']) r0 = syz_open_dev$vcsa(&(0x7f00000003c0), 0x0, 0x98540) accept(r0, &(0x7f0000000400)=@ethernet={0x0, @remote}, &(0x7f0000000480)=0x80) 20:41:49 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 11) 20:41:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:41:49 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) [ 2421.645254] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 20:41:49 executing program 6: syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x5e, 0x0, 0xe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xffffffffffff0f8d}, 0x1c280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x2, &(0x7f0000000240)={0x0, 0xb, 0x4}, &(0x7f0000000040)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x280400, 0x0) kcmp(0x0, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000540)={0x320880, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240)=0x0, {0x8}, &(0x7f0000000280)=""/244, 0xf4, &(0x7f0000000380)=""/239, &(0x7f0000000500)=[0x0, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) perf_event_open(0x0, r4, 0x3, r3, 0x9) timer_create(0x6, &(0x7f0000000300)={0x0, 0x24, 0x5, @tid=r4}, &(0x7f0000000340)) capset(&(0x7f0000000180)={0x20080522, r2}, &(0x7f00000002c0)={0x40, 0x2, 0xfffffaf2, 0x6, 0xffffffff, 0x40}) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000168fbf51173bba277a00000000000000"], 0x14}}, 0x44009) read(r1, &(0x7f0000000080)=""/65, 0x41) timer_gettime(r0, &(0x7f0000000080)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:41:49 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0x10000000000101, 0x0, &(0x7f0000000200), 0x1140800, &(0x7f0000012900)=ANY=[]) mount(&(0x7f0000000140)=@nullb, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='configfs\x00', 0x200040, &(0x7f0000000280)='ext4\x00') mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000040)='./file1/file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 20:41:49 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:49 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{r0, r1/1000+60000}, {0x77359400}}) 20:41:49 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80000001) [ 2421.670980] kauditd_printk_skb: 44 callbacks suppressed [ 2421.670998] audit: type=1326 audit(1705351309.976:1142): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.677261] audit: type=1326 audit(1705351309.977:1143): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.687908] audit: type=1326 audit(1705351309.983:1144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.698829] audit: type=1326 audit(1705351309.983:1145): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.728615] audit: type=1326 audit(1705351309.983:1146): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.742466] FAULT_INJECTION: forcing a failure. [ 2421.742466] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2421.745071] CPU: 0 PID: 19561 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2421.746473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2421.748176] Call Trace: [ 2421.748728] dump_stack+0x107/0x167 [ 2421.749480] should_fail.cold+0x5/0xa [ 2421.750262] __alloc_pages_nodemask+0x182/0x600 [ 2421.751199] ? xa_load+0x12d/0x2c0 [ 2421.751944] ? lock_downgrade+0x6d0/0x6d0 [ 2421.752776] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2421.754023] alloc_pages_current+0x187/0x280 [ 2421.754913] __page_cache_alloc+0x2d2/0x360 [ 2421.755804] page_cache_ra_unbounded+0x207/0x6f0 [ 2421.756778] ? read_pages+0xbc0/0xbc0 [ 2421.757545] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2421.758478] ? __is_insn_slot_addr+0x14c/0x290 [ 2421.759428] ondemand_readahead+0x8e5/0x1150 [ 2421.760349] page_cache_sync_ra+0x138/0x170 [ 2421.761234] generic_file_buffered_read+0xc8e/0x2920 [ 2421.762254] ? stack_trace_save+0x8c/0xc0 [ 2421.763120] ? alloc_pipe_info+0x1e5/0x590 [ 2421.763984] ? pagecache_get_page+0xc80/0xc80 [ 2421.764902] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2421.765858] generic_file_read_iter+0x33f/0x490 [ 2421.766799] ? __fsnotify_parent+0x488/0x9d0 [ 2421.767697] ? iov_iter_pipe+0xf1/0x2a0 [ 2421.768514] generic_file_splice_read+0x455/0x6d0 [ 2421.769482] ? pipe_to_user+0x170/0x170 [ 2421.770293] ? _cond_resched+0x12/0x80 [ 2421.771087] ? avc_policy_seqno+0x9/0x70 [ 2421.771920] ? selinux_file_permission+0x92/0x520 [ 2421.772910] ? lockdep_init_map_type+0x2c7/0x780 [ 2421.773874] ? pipe_to_user+0x170/0x170 [ 2421.774683] do_splice_to+0x10e/0x160 [ 2421.775464] splice_direct_to_actor+0x2fe/0x980 [ 2421.776436] ? pipe_to_sendpage+0x380/0x380 [ 2421.777319] ? do_splice_to+0x160/0x160 [ 2421.778128] ? security_file_permission+0x24e/0x570 [ 2421.779153] do_splice_direct+0x1c4/0x290 [ 2421.780002] ? splice_direct_to_actor+0x980/0x980 [ 2421.780975] ? selinux_file_permission+0x92/0x520 [ 2421.781961] ? security_file_permission+0x24e/0x570 [ 2421.782986] do_sendfile+0x553/0x1090 [ 2421.783783] ? do_pwritev+0x270/0x270 [ 2421.784561] ? wait_for_completion_io+0x270/0x270 [ 2421.785544] ? rcu_read_lock_any_held+0x75/0xa0 [ 2421.786489] ? vfs_write+0x354/0xa70 [ 2421.787255] __x64_sys_sendfile64+0x1d1/0x210 [ 2421.788182] ? __ia32_sys_sendfile+0x220/0x220 [ 2421.789129] do_syscall_64+0x33/0x40 [ 2421.789886] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2421.790924] RIP: 0033:0x7f85f7bb8b19 [ 2421.791688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2421.795383] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2421.796951] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2421.798393] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2421.799843] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2421.801292] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 2421.802771] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 20:41:50 executing program 1: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x480) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x1, &(0x7f00000000c0)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x0, &(0x7f0000000100)}) [ 2421.833601] audit: type=1326 audit(1705351309.988:1147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 20:41:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) [ 2421.871641] audit: type=1326 audit(1705351309.989:1148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.917132] audit: type=1326 audit(1705351309.989:1149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.934899] audit: type=1326 audit(1705351309.990:1150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdf108ecb19 code=0x7ffc0000 [ 2421.945109] audit: type=1326 audit(1705351309.990:1151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=19548 comm="syz-executor.2" exe="/syz-executor.2" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7fdf108ecad7 code=0x7ffc0000 [ 2421.996374] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:41:50 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000100)={0x1, 0xb9aa, @start={0x0, 0x0, "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", "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"}, [0x2, 0x6e55, 0xbbe5, 0xda36, 0xc564, 0x8001, 0x6, 0x7fffffff, 0x10000, 0x6, 0x6, 0x6, 0xffff, 0x6, 0xbd, 0x9, 0x0, 0x2, 0x6, 0xffffffffffffffb7, 0x6, 0x6, 0x38000000, 0xfffffffffffffffb, 0x4, 0x0, 0xfff, 0x8, 0x80000001, 0x7f, 0xbb4, 0xffffffffffff8000, 0x81, 0x2c, 0xfd, 0x7c6, 0x146, 0x1337, 0x0, 0x5, 0x0, 0xd5, 0xda, 0x8, 0x3, 0xcb, 0x100000001, 0x81, 0x4, 0x7, 0x9, 0x1476, 0x56, 0x2, 0x7, 0x7f, 0x4d, 0x4, 0x1000, 0x1, 0xc26, 0x20, 0x7fff, 0x3f]}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/diskstats\x00', 0x0, 0x0) ioctl$sock_bt_hci(r1, 0x400448cb, &(0x7f0000000b40)="2c312e41b5f60aae92d70013e083fc64ce2479b7cecbd788628059aa9dea62b011babb07da79ab45eee564fb28e297b422b22d37ececfcdff1984afdf98cea45d40f625b102b175e564125c9a13a77e99a9417b2b7629f35d0cbe985ddbec35acadab0adf60e91b7aafeb3d71a1efb038d7975f5b00a573caa526976c01b567f7ec26a87c220b5e99d9daa2098491acab3236efb4f1aee6acd3967722689776aac6bc979a0b6f9b8c705a4551ca49ded047e3ec877062c0c1dd4a4f1888507212a3afff3825a187cadccde1bb494fb5c9c9b2916776bab616ea5a760d5eb976cd8b79a") 20:41:50 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r2 = fork() ptrace$setopts(0x4206, r2, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r3, 0x6}) ptrace(0x8, r2) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r2, 0x10, r1, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000140)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffeffffffffffffffffff2209b59ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}, {&(0x7f0000000280)="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", 0x1000, 0x400}], 0x0, &(0x7f0000012900)=ANY=[]) umount2(&(0x7f0000000040)='./file1\x00', 0xb) mkdirat(r0, &(0x7f00000000c0)='./file1\x00', 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file2\x00', &(0x7f0000000240)={0x400, 0x9, 0x12}, 0x18) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000080)='\x00', &(0x7f00000001c0)='./file0\x00', r1) 20:41:50 executing program 6: futex(0x0, 0x7, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), 0x0, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$chown(0x4, r1, 0xee01, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80743, 0x88) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)='\x00', r1) keyctl$link(0x8, r1, r3) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000040)=0x1, 0x4) syz_io_uring_setup(0x7de0, &(0x7f0000000280)={0x0, 0xa354, 0x0, 0x3, 0x31c}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000300)=0x0, &(0x7f0000000340)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) syz_io_uring_submit(r4, 0x0, &(0x7f0000000380)=@IORING_OP_FSYNC={0x3, 0x5, 0x0, @fd=r5, 0x0, 0x0, 0x0, 0x1}, 0xffffffff) write$rfkill(r2, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2422.300306] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 2422.328702] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 20:41:50 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xff, 0x0, 0x7fffffff}]}) getitimer(0x0, &(0x7f0000000080)) pread64(r0, &(0x7f00000000c0)=""/165, 0xa5, 0x6) 20:41:50 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) openat(r1, &(0x7f0000000040)='./file1\x00', 0x202800, 0x4a) [ 2422.461465] [ 2422.461847] ====================================================== [ 2422.463120] WARNING: possible circular locking dependency detected [ 2422.464388] 5.10.207 #1 Not tainted [ 2422.465118] ------------------------------------------------------ [ 2422.466481] syz-executor.6/19686 is trying to acquire lock: [ 2422.467736] ffff88800ea74b78 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}, at: __flush_work+0xdd/0xa90 [ 2422.469864] [ 2422.469864] but task is already holding lock: [ 2422.471062] ffffffff85619628 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 2422.475183] [ 2422.475183] which lock already depends on the new lock. [ 2422.475183] [ 2422.476799] [ 2422.476799] the existing dependency chain (in reverse order) is: [ 2422.478260] [ 2422.478260] -> #5 (rfkill_global_mutex){+.+.}-{3:3}: [ 2422.479602] __mutex_lock+0x13d/0x10b0 [ 2422.480487] rfkill_register+0x36/0xa10 [ 2422.481407] hci_register_dev+0x42e/0xc00 [ 2422.482357] __vhci_create_device+0x2c8/0x5c0 [ 2422.483369] vhci_open_timeout+0x38/0x50 [ 2422.484310] process_one_work+0x9a9/0x14b0 [ 2422.485266] worker_thread+0x61d/0x1310 [ 2422.486174] kthread+0x38f/0x470 [ 2422.486961] ret_from_fork+0x22/0x30 [ 2422.487813] [ 2422.487813] -> #4 (&data->open_mutex){+.+.}-{3:3}: [ 2422.489123] __mutex_lock+0x13d/0x10b0 [ 2422.490008] vhci_send_frame+0x63/0xa0 [ 2422.490896] hci_send_frame+0x1b9/0x320 [ 2422.491821] hci_cmd_work+0x15e/0x2d0 [ 2422.492693] process_one_work+0x9a9/0x14b0 [ 2422.493645] worker_thread+0x61d/0x1310 [ 2422.494548] kthread+0x38f/0x470 [ 2422.495332] ret_from_fork+0x22/0x30 [ 2422.496183] [ 2422.496183] -> #3 ((work_completion)(&hdev->cmd_work)){+.+.}-{0:0}: [ 2422.497797] process_one_work+0x92d/0x14b0 [ 2422.498899] worker_thread+0x61d/0x1310 [ 2422.499990] kthread+0x38f/0x470 [ 2422.500833] ret_from_fork+0x22/0x30 [ 2422.501763] [ 2422.501763] -> #2 ((wq_completion)hci0#2){+.+.}-{0:0}: [ 2422.503162] flush_workqueue+0x105/0x1140 [ 2422.504192] drain_workqueue+0x1a5/0x3c0 [ 2422.505219] hci_dev_reset+0x255/0x6b0 [ 2422.506184] hci_sock_ioctl+0x3b2/0x980 [ 2422.507088] sock_do_ioctl+0xd3/0x300 [ 2422.508030] sock_ioctl+0x3ea/0x700 [ 2422.508955] __x64_sys_ioctl+0x19a/0x210 [ 2422.509927] do_syscall_64+0x33/0x40 [ 2422.510890] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2422.512139] [ 2422.512139] -> #1 (&hdev->req_lock){+.+.}-{3:3}: [ 2422.513562] __mutex_lock+0x13d/0x10b0 [ 2422.514560] bg_scan_update+0x82/0x500 [ 2422.515549] process_one_work+0x9a9/0x14b0 [ 2422.516617] worker_thread+0x61d/0x1310 [ 2422.517630] kthread+0x38f/0x470 [ 2422.518581] ret_from_fork+0x22/0x30 [ 2422.519527] [ 2422.519527] -> #0 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}: [ 2422.521487] __lock_acquire+0x29e7/0x5b00 [ 2422.522586] lock_acquire+0x197/0x470 [ 2422.523661] __flush_work+0x105/0xa90 [ 2422.524633] __cancel_work_timer+0x368/0x4c0 [ 2422.525793] hci_request_cancel_all+0x73/0x230 [ 2422.526928] hci_dev_do_close+0xd9/0x1240 [ 2422.528054] hci_rfkill_set_block+0x166/0x1a0 [ 2422.529169] rfkill_set_block+0x1fd/0x540 [ 2422.530207] rfkill_fop_write+0x253/0x4b0 [ 2422.531304] vfs_write+0x29a/0xa70 [ 2422.532343] ksys_write+0x1f6/0x260 [ 2422.533271] do_syscall_64+0x33/0x40 [ 2422.534272] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2422.535530] [ 2422.535530] other info that might help us debug this: [ 2422.535530] [ 2422.537394] Chain exists of: [ 2422.537394] (work_completion)(&hdev->bg_scan_update) --> &data->open_mutex --> rfkill_global_mutex [ 2422.537394] [ 2422.540671] Possible unsafe locking scenario: [ 2422.540671] [ 2422.541994] CPU0 CPU1 [ 2422.543018] ---- ---- [ 2422.544132] lock(rfkill_global_mutex); [ 2422.545047] lock(&data->open_mutex); [ 2422.546656] lock(rfkill_global_mutex); [ 2422.548131] lock((work_completion)(&hdev->bg_scan_update)); [ 2422.549499] [ 2422.549499] *** DEADLOCK *** [ 2422.549499] [ 2422.550864] 1 lock held by syz-executor.6/19686: [ 2422.551991] #0: ffffffff85619628 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 2422.554219] [ 2422.554219] stack backtrace: [ 2422.555268] CPU: 1 PID: 19686 Comm: syz-executor.6 Not tainted 5.10.207 #1 [ 2422.556894] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2422.558825] Call Trace: [ 2422.559416] dump_stack+0x107/0x167 [ 2422.560303] check_noncircular+0x263/0x2e0 [ 2422.561296] ? register_lock_class+0xbb/0x17b0 [ 2422.562375] ? print_circular_bug+0x470/0x470 [ 2422.563524] ? find_first_zero_bit+0x94/0xb0 [ 2422.564528] ? alloc_chain_hlocks+0x342/0x5a0 [ 2422.565564] __lock_acquire+0x29e7/0x5b00 [ 2422.566504] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2422.567752] ? SOFTIRQ_verbose+0x10/0x10 [ 2422.568666] ? __lockdep_reset_lock+0x180/0x180 [ 2422.569858] ? mark_lock+0xf5/0x2df0 [ 2422.570772] lock_acquire+0x197/0x470 [ 2422.571691] ? __flush_work+0xdd/0xa90 [ 2422.572562] ? lock_release+0x680/0x680 [ 2422.573471] ? __flush_work+0x78c/0xa90 [ 2422.574512] ? lock_downgrade+0x6d0/0x6d0 [ 2422.575502] __flush_work+0x105/0xa90 [ 2422.576388] ? __flush_work+0xdd/0xa90 [ 2422.577277] ? lock_chain_count+0x20/0x20 [ 2422.578204] ? queue_delayed_work_on+0xe0/0xe0 [ 2422.579372] ? mark_lock+0xf5/0x2df0 [ 2422.580277] ? mark_lock+0xf5/0x2df0 [ 2422.581115] ? lock_chain_count+0x20/0x20 [ 2422.582049] ? perf_trace_lock+0xac/0x490 [ 2422.583035] ? lock_chain_count+0x20/0x20 [ 2422.583999] ? mark_held_locks+0x9e/0xe0 [ 2422.585050] __cancel_work_timer+0x368/0x4c0 [ 2422.586084] ? cancel_delayed_work+0x20/0x20 [ 2422.587076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2422.588315] ? __cancel_work+0x250/0x2b0 [ 2422.589268] ? trace_hardirqs_on+0x5b/0x180 [ 2422.590326] ? __cancel_work+0x1bb/0x2b0 [ 2422.591234] ? try_to_grab_pending+0xe0/0xe0 [ 2422.592288] hci_request_cancel_all+0x73/0x230 [ 2422.593313] hci_dev_do_close+0xd9/0x1240 [ 2422.594243] ? rfkill_set_block+0x18f/0x540 [ 2422.595211] ? hci_dev_open+0x350/0x350 [ 2422.596179] ? mark_held_locks+0x9e/0xe0 [ 2422.597187] hci_rfkill_set_block+0x166/0x1a0 [ 2422.598257] ? hci_power_off+0x20/0x20 [ 2422.599124] rfkill_set_block+0x1fd/0x540 [ 2422.600109] rfkill_fop_write+0x253/0x4b0 [ 2422.601038] ? rfkill_sync_work+0xa0/0xa0 [ 2422.601964] ? security_file_permission+0x24e/0x570 [ 2422.603117] ? rfkill_sync_work+0xa0/0xa0 [ 2422.604079] vfs_write+0x29a/0xa70 [ 2422.604879] ksys_write+0x1f6/0x260 [ 2422.605829] ? __ia32_sys_read+0xb0/0xb0 [ 2422.606776] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2422.607957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2422.609118] do_syscall_64+0x33/0x40 [ 2422.609950] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2422.611094] RIP: 0033:0x7f36e5a75b19 [ 2422.611943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2422.616073] RSP: 002b:00007f36e2feb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2422.617769] RAX: ffffffffffffffda RBX: 00007f36e5b88f60 RCX: 00007f36e5a75b19 [ 2422.619358] RDX: 0000000000000008 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2422.620961] RBP: 00007f36e5acff6d R08: 0000000000000000 R09: 0000000000000000 [ 2422.622557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2422.624157] R13: 00007fff8ab6754f R14: 00007f36e2feb300 R15: 0000000000022000 [ 2422.777753] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 20:41:51 executing program 0: syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80000001) (fail_nth: 12) 20:41:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000020003905af11c67cc0728c00020000000c0000800501000000000000"], 0x20}}, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2800, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000, 0x28) dup2(0xffffffffffffffff, r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r4}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r6}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x248, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x130, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x23, 0x5, "c461bfa6e5ddcc9cb83eebdc3b05bae32c0369f70adefee3f047db93843f1a"}, @ETHTOOL_A_BITSET_BITS={0xe4, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb02c}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x297}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '({\x181]&/}-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '[\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc0}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x16, 0x2, '/proc/thread-self\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(-\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000000}, @ETHTOOL_A_BITSET_MASK={0x19, 0x5, "376034fac72a20a544a923a79f6c75e1c6578c2c4c"}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x91}, 0x2000890) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x200080c0}, 0x4040000) unshare(0x48020200) 20:41:51 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000040)}) getitimer(0x2, &(0x7f0000000080)) openat$procfs(0xffffffffffffff9c, &(0x7f0000001580)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x40080) kcmp(r1, 0x0, 0x6, r2, r0) fcntl$notify(r0, 0x402, 0x1) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}, {0x77359400}}) r3 = openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x140, 0x100, 0x14}, 0x18) sendmsg$nl_generic(r3, &(0x7f0000001540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001500)={&(0x7f0000000280)={0x1258, 0x16, 0x20, 0x70bd26, 0x25dfdbfc, {0x1b}, [@nested={0x1fc, 0x27, 0x0, 0x1, [@typed={0x6, 0x20, 0x0, 0x0, @str='^\x00'}, @generic="0132cf41032933dc789a406b7460dbc27c338b764c76751855647eb658a6361c7e10e5e581a11ea0e35728fb12f8df2fa79fe893f741ff2e54e0382bc5265082e37fa2d2ccfee6e142adac3853a88a9b9862e35ee749e131ae4262560378d3b94861391a2babac0c3ac04133330839e0486a8453a63603fe0b970bd5434031652f0a6fe74587ff5c7111028733636a3f343eada73ddca2d7ea779c23134ff786a8296b62cbb4fb91204ed75dcd6e1ba020dfe18efa4e0eed096f257bd4e00b9364fb2a14024bb9b05819d66e108c7a6baff89975246380d529830a33fd139d654ed3e948c376", @generic="5ce2701c3ae3ea1b77a16efb962d9e04c1600c7248134243e19ddf6f9be94f4602396f4bdee21a55a6da3017eec0a0b53034bda53b85079b716d85421585c16382cdeb072bc06a53089180631f2864a545fd7c3c2b4ebc024d44e845e9b4d06e54efa54fd0a41a52c698daa9202dd622eebca200bd0826546e93d4c7d4e5d018f7a711", @generic="6f9184a59d2665d01dd0a515b9421a06d0c7b7321311f15eb208f5a73b1b1791d807eef6ead2c2fb888ef296de3a469a4dcae8880c26be782a7d39a09b4c87a9735ac72c347723cc09a51d95f29acec5edda768c8ca7b386969584a23a95dbb9d5dd829f779c7521369a2d95d73a1af1ec2fd158b755a1831dc1a0a04b99cb11c81ed9847f4851"]}, @generic="3480b1716333b1d5266921db59f9d320621c0f71c1374a9f7f5540dfb7bac3abfb4cc0a04c58a5b439826cd8e1708d926151c2544c8f18403e7f9463640b2701a2e5296368d1", @generic="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"]}, 0x1258}, 0x1, 0x0, 0x0, 0xe5b908b7d4526f62}, 0x840) 20:41:51 executing program 2: getsockopt$IP_SET_OP_GET_BYNAME(0xffffffffffffffff, 0x1, 0x53, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(r0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x2001) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000600), 0x40, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r3 = fork() ptrace$setopts(0x4206, r3, 0x0, 0x1) getdents64(0xffffffffffffffff, &(0x7f00000000c0)=""/149, 0x95) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000340)=ANY=[@ANYBLOB="001800001cf4d4447646b37bb9ab2b3b8d7d4ebbce54cdb6a46100008be3a0642cf5dc46855e3ace55d874c740080d8836cc2100ada6b9397961091969756aef14d6673fa1ff20091748b7a93ee050ba01fce417472c6e66abb26a8cf4a3d10c128e096410313c9d9adcdce087d7a4bac9d20f094728a0e7e3421d17d84cadda33dcd71483e2f4a2ecd2b9070a70221820a47488219ba25005cde7e5e06d00"/182, @ANYRESDEC, @ANYRESHEX]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000180)={0x0, 0x0, r4, 0x6}) ptrace(0x8, r3) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x7f, 0x0, 0x5, 0x0, 0x3, 0x881, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x10800, 0x10000, 0x2, 0x5, 0x4, 0x6, 0x81, 0x0, 0x7}, r3, 0x10, r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)) 20:41:51 executing program 3: r0 = syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) syz_usb_disconnect(r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000004d00), 0x400010e, 0xc000) sendfile(r1, r2, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x24000, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xca0cc, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80000001) 20:41:51 executing program 7: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000280)=""/237, &(0x7f0000000080)=0xed) [ 2423.202276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2423.209287] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 133159172)! [ 2423.211247] EXT4-fs (loop7): group descriptors corrupted! r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000001300)="0800000004d9ef0705000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f00000012c0)="ed41000000040000d7df6c5fd7f4651b93dd3bd6f66b76f57fe2ce4cfc8e00e8cb", 0x21, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) mkdirat(r1, &(0x7f00000000c0)='./file1\x00', 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}) ioctl$INCFS_IOC_PERMIT_FILL(r2, 0x40046721, &(0x7f0000000140)={r1}) [ 2423.265446] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 133159172)! [ 2423.267800] EXT4-fs (loop7): group descriptors corrupted! [ 2423.357269] FAULT_INJECTION: forcing a failure. [ 2423.357269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2423.360121] CPU: 0 PID: 19900 Comm: syz-executor.0 Not tainted 5.10.207 #1 [ 2423.361635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2423.363454] Call Trace: [ 2423.364049] dump_stack+0x107/0x167 [ 2423.364857] should_fail.cold+0x5/0xa [ 2423.365691] __alloc_pages_nodemask+0x182/0x600 [ 2423.366714] ? xa_load+0x12d/0x2c0 [ 2423.367497] ? lock_downgrade+0x6d0/0x6d0 [ 2423.368428] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2423.369732] ? xas_start+0x14d/0x580 [ 2423.370558] alloc_pages_current+0x187/0x280 [ 2423.371518] __page_cache_alloc+0x2d2/0x360 [ 2423.372471] page_cache_ra_unbounded+0x207/0x6f0 [ 2423.373522] ? read_pages+0xbc0/0xbc0 [ 2423.374351] ? __lock_page_or_retry+0x4e0/0x4e0 [ 2423.375367] ? __is_insn_slot_addr+0x14c/0x290 [ 2423.376384] ondemand_readahead+0x8e5/0x1150 [ 2423.377347] page_cache_sync_ra+0x138/0x170 [ 2423.378271] generic_file_buffered_read+0xc8e/0x2920 [ 2423.379339] ? stack_trace_save+0x8c/0xc0 [ 2423.380243] ? perf_trace_lock_acquire+0xbc/0x590 [ 2423.381282] ? unwind_next_frame+0x13ef/0x1a90 [ 2423.382275] ? alloc_pipe_info+0x1e5/0x590 [ 2423.383185] ? pagecache_get_page+0xc80/0xc80 [ 2423.384170] ? __x64_sys_sendfile64+0x1d1/0x210 [ 2423.385183] generic_file_read_iter+0x33f/0x490 [ 2423.386191] ? __fsnotify_parent+0x488/0x9d0 [ 2423.387138] ? iov_iter_pipe+0xf1/0x2a0 [ 2423.388007] generic_file_splice_read+0x455/0x6d0 [ 2423.389047] ? pipe_to_user+0x170/0x170 [ 2423.389902] ? _cond_resched+0x12/0x80 [ 2423.390744] ? avc_policy_seqno+0x9/0x70 [ 2423.391628] ? selinux_file_permission+0x92/0x520 [ 2423.392674] ? lockdep_init_map_type+0x2c7/0x780 [ 2423.393664] ? pipe_to_user+0x170/0x170 [ 2423.394494] do_splice_to+0x10e/0x160 [ 2423.395317] splice_direct_to_actor+0x2fe/0x980 [ 2423.396336] ? pipe_to_sendpage+0x380/0x380 [ 2423.397258] ? do_splice_to+0x160/0x160 [ 2423.398103] ? security_file_permission+0x24e/0x570 [ 2423.399166] do_splice_direct+0x1c4/0x290 [ 2423.400051] ? splice_direct_to_actor+0x980/0x980 [ 2423.401079] ? selinux_file_permission+0x92/0x520 [ 2423.402115] ? security_file_permission+0x24e/0x570 [ 2423.403191] do_sendfile+0x553/0x1090 [ 2423.404020] ? do_pwritev+0x270/0x270 [ 2423.404832] ? wait_for_completion_io+0x270/0x270 [ 2423.405859] ? vfs_write+0x354/0xa70 [ 2423.406658] __x64_sys_sendfile64+0x1d1/0x210 [ 2423.407636] ? __ia32_sys_sendfile+0x220/0x220 [ 2423.408600] do_syscall_64+0x33/0x40 [ 2423.409388] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2423.410484] RIP: 0033:0x7f85f7bb8b19 [ 2423.411287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2423.415185] RSP: 002b:00007f85f510d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2423.416811] RAX: ffffffffffffffda RBX: 00007f85f7ccc020 RCX: 00007f85f7bb8b19 [ 2423.418318] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 2423.419836] RBP: 00007f85f510d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2423.421345] R10: 0000000080000001 R11: 0000000000000246 R12: 0000000000000002 [ 2423.422848] R13: 00007ffc5fc0f5cf R14: 00007f85f510d300 R15: 0000000000022000 VM DIAGNOSIS: 20:41:50 Registers: info registers vcpu 0 RAX=ffffffff816c070b RBX=ffff8880088bf9e8 RCX=ffff8880088bf9e8 RDX=dffffc0000000000 RSI=ffff8880088bfd10 RDI=ffff8880088bfd10 RBP=ffff8880088bfd10 RSP=ffff8880088bf898 R8 =ffffffff85a0ea8b R9 =ffff8880088bfd18 R10=0000000000032042 R11=1ffff11001117f21 R12=ffff8880088bf9a0 R13=ffff8880088b8000 R14=1ffff11001117f21 R15=ffffffff85a0ea8a RIP=ffffffff811070e2 RFL=00000297 [--S-APC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f8a07461900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe3e00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f502912d8c8 CR3=000000000faec000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000ff000000ff00 XMM02=696c732e6d65747379732f0065706f63 XMM03=67630073746e6576652e70756f726763 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000055918b9bb190000055918b9ee050 XMM06=000055918b9ba5800000000000000000 XMM07=00000000000000000000000000000000 XMM08=000000000000000000006d6574737973 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822cb6fc RDI=ffffffff879e8240 RBP=ffffffff879e8200 RSP=ffff888052d4f170 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0f3d094 R14=fffffbfff0f3d04a R15=dffffc0000000000 RIP=ffffffff822cb750 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f36e2feb700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe5e00000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fdc0ac963a4 CR3=000000004e3b4000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000