2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:47:33 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) [ 1251.860162] perf: interrupt took too long (2522 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 [ 1265.256212] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:47:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) 10:47:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:47:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x540c, 0x0) 10:47:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x540c, 0x0) 10:47:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3004, 0x0, 0x0, 0x0, 0x3) 10:47:55 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x12c, 0x0, 0x0}, 0x58) 10:47:55 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:47:55 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:47:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x0, 0x3) 10:47:55 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x300, 0x0, 0x0}, 0x58) 10:47:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) 10:47:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) [ 1273.209053] perf: interrupt took too long (3182 > 3152), lowering kernel.perf_event_max_sample_rate to 62000 10:47:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) [ 1273.271574] perf: interrupt took too long (4006 > 3977), lowering kernel.perf_event_max_sample_rate to 49000 10:47:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x3) 10:47:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x540d, 0x0) 10:47:55 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:47:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:47:55 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x500, 0x0, 0x0}, 0x58) 10:48:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5412, 0x0) 10:48:11 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:11 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x1100, 0x0, 0x0}, 0x58) 10:48:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:48:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x540d, 0x0) 10:48:11 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf0, 0x0, 0x0, 0x3) 10:48:11 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:48:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x540b, 0x0) 10:48:11 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) 10:48:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:48:11 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:48:11 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x1637, 0x0, 0x0}, 0x58) 10:48:11 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:48:11 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 1302.949185] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:48:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5413, 0x0) 10:48:33 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf000, 0x0, 0x0, 0x3) 10:48:33 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:48:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:48:33 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:33 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5412, 0x0) 10:48:33 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2000, 0x0, 0x0}, 0x58) 10:48:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x540b, 0x0) 10:48:33 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf0ffff, 0x0, 0x0, 0x3) 10:48:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:48:33 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:48:33 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2c01, 0x0, 0x0}, 0x58) 10:48:33 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:33 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:33 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x0, 0x0, 0x3) 10:48:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5414, 0x0) 10:48:33 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:33 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5413, 0x0) 10:48:33 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:48:33 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x3716, 0x0, 0x0}, 0x58) [ 1326.433016] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:48:56 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:48:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:48:56 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5414, 0x0) 10:48:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5415, 0x0) 10:48:56 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:56 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00, 0x0, 0x0}, 0x58) 10:48:56 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:48:56 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x0, 0x0, 0x3) 10:48:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:48:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000040)={0xff, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:48:56 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000000, 0x0, 0x0, 0x3) 10:49:10 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x4000, 0x0, 0x0}, 0x58) 10:49:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5416, 0x0) 10:49:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5415, 0x0) 10:49:10 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x40000000, 0x0, 0x0, 0x3) 10:49:10 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:10 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:49:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, 0x0) 10:49:10 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xfffff000, 0x0, 0x0, 0x3) 10:49:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, 0x0) 10:49:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:49:10 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xcd00, 0x0, 0x0}, 0x58) 10:49:10 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:10 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:10 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x20010, 0x0, 0x0}, 0x58) 10:49:10 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000000000, 0x0, 0x0, 0x3) 10:49:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5418, 0x0) 10:49:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, 0x0) 10:49:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541b, 0x0) 10:49:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:49:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0xfffffffe, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:49:32 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5416, 0x0) 10:49:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf0ffffffffffff, 0x0, 0x0, 0x3) 10:49:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x20200, 0x0, 0x0}, 0x58) 10:49:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000000000000, 0x0, 0x0, 0x3) 10:49:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:49:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x101000, 0x0, 0x0}, 0x58) 10:49:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541d, 0x0) 10:49:46 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x200000000000000, 0x0, 0x0, 0x3) 10:49:46 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:49:46 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x1000000, 0x0, 0x0}, 0x58) 10:49:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x101, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:49:46 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:49:46 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5418, 0x0) 10:49:46 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000, 0x0, 0x0}, 0x58) 10:49:46 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x400000000000000, 0x0, 0x0, 0x3) 10:49:46 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:49:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x80, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:49:46 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:49:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541e, 0x0) 10:49:46 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x3000000, 0x0, 0x0}, 0x58) 10:49:47 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000000000000000, 0x0, 0x0, 0x3) 10:50:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x63, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:50:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541e, 0x0) 10:50:00 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:50:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:50:00 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:50:00 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541b, 0x0) 10:50:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x5000000, 0x0, 0x0}, 0x58) 10:50:00 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xffffffff00000000, 0x0, 0x0, 0x3) 10:50:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:50:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x8000000, 0x0, 0x0}, 0x58) 10:50:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xffff, 0x9}) 10:50:01 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:50:01 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xfffffffffffff000, 0x0, 0x0, 0x3) 10:50:01 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x10000200, 0x0, 0x0}, 0x58) 10:50:01 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541d, 0x0) 10:50:01 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 1411.555065] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:50:23 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541e, 0x0) 10:50:23 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:50:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) (fail_nth: 1) 10:50:23 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x11000000, 0x0, 0x0}, 0x58) 10:50:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5421, 0x0) 10:50:23 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:50:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2, 0x3) 10:50:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x9}) [ 1421.114430] FAULT_INJECTION: forcing a failure. [ 1421.114430] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1421.116878] CPU: 1 PID: 7210 Comm: syz-executor.3 Not tainted 5.10.162 #1 [ 1421.118248] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1421.119908] Call Trace: [ 1421.120447] dump_stack+0x107/0x167 [ 1421.121209] should_fail.cold+0x5/0xa [ 1421.121987] __alloc_pages_nodemask+0x182/0x680 [ 1421.122922] ? walk_pgd_range+0x1eb/0x1690 [ 1421.123776] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1421.125018] alloc_pages_vma+0xbb/0x410 [ 1421.126013] new_page+0x222/0x280 [ 1421.126778] migrate_pages+0x45a/0x23c0 [ 1421.127753] ? vma_migratable+0x330/0x330 [ 1421.128645] ? alloc_pages_vma+0x410/0x410 [ 1421.129570] ? buffer_migrate_page_norefs+0x40/0x40 [ 1421.130620] ? vmacache_find+0x55/0x2a0 [ 1421.131486] do_mbind+0x943/0xb20 [ 1421.132246] ? lock_downgrade+0x6d0/0x6d0 [ 1421.133255] ? __mpol_equal+0x350/0x350 [ 1421.134217] ? ksys_write+0x12d/0x260 [ 1421.135138] ? memset+0x20/0x50 [ 1421.135938] ? get_nodes+0x202/0x270 [ 1421.136850] __x64_sys_mbind+0x23d/0x290 [ 1421.137831] ? __ia32_compat_sys_mbind+0x2a0/0x2a0 [ 1421.139011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1421.140268] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1421.141529] do_syscall_64+0x33/0x40 [ 1421.142431] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1421.143653] RIP: 0033:0x7f6927d1bb19 [ 1421.144546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1421.149043] RSP: 002b:00007f6925291188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 1421.150884] RAX: ffffffffffffffda RBX: 00007f6927e2ef60 RCX: 00007f6927d1bb19 [ 1421.152613] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffd000 [ 1421.154335] RBP: 00007f69252911d0 R08: 0000000000000000 R09: 0000000000000003 [ 1421.156047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1421.157991] R13: 00007ffc6e78f72f R14: 00007f6925291300 R15: 0000000000022000 10:50:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4, 0x3) 10:50:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x9}) 10:50:23 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x20000000, 0x0, 0x0}, 0x58) 10:50:23 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:50:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf0, 0x3) 10:50:23 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:50:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5423, 0x0) 10:50:23 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2c010000, 0x0, 0x0}, 0x58) 10:50:23 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x541e, 0x0) 10:50:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:50:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4000, 0x3) 10:50:23 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:50:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) (fail_nth: 2) [ 1421.600096] FAULT_INJECTION: forcing a failure. [ 1421.600096] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1421.603406] CPU: 1 PID: 7259 Comm: syz-executor.3 Not tainted 5.10.162 #1 [ 1421.605071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1421.607068] Call Trace: [ 1421.607716] dump_stack+0x107/0x167 [ 1421.608615] should_fail.cold+0x5/0xa [ 1421.609549] __alloc_pages_nodemask+0x182/0x680 [ 1421.610686] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1421.612135] ? mark_held_locks+0x9e/0xe0 [ 1421.613133] alloc_pages_vma+0xbb/0x410 [ 1421.614099] new_page+0x222/0x280 [ 1421.614941] migrate_pages+0x45a/0x23c0 [ 1421.615898] ? alloc_pages_vma+0x410/0x410 [ 1421.616952] ? buffer_migrate_page_norefs+0x40/0x40 [ 1421.618143] ? alloc_migration_target+0x4d0/0x4d0 [ 1421.619303] ? vmacache_find+0x55/0x2a0 [ 1421.620277] do_mbind+0x943/0xb20 [ 1421.621144] ? lock_downgrade+0x6d0/0x6d0 [ 1421.622139] ? __mpol_equal+0x350/0x350 [ 1421.623108] ? ksys_write+0x12d/0x260 [ 1421.624038] ? memset+0x20/0x50 [ 1421.624857] ? get_nodes+0x202/0x270 [ 1421.625757] __x64_sys_mbind+0x23d/0x290 [ 1421.626742] ? __ia32_compat_sys_mbind+0x2a0/0x2a0 [ 1421.627926] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1421.629219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1421.630456] do_syscall_64+0x33/0x40 [ 1421.631358] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1421.632608] RIP: 0033:0x7f6927d1bb19 [ 1421.633499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1421.637975] RSP: 002b:00007f6925291188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 1421.639793] RAX: ffffffffffffffda RBX: 00007f6927e2ef60 RCX: 00007f6927d1bb19 [ 1421.641534] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffd000 [ 1421.643227] RBP: 00007f69252911d0 R08: 0000000000000000 R09: 0000000000000003 [ 1421.644967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1421.646666] R13: 00007ffc6e78f72f R14: 00007f6925291300 R15: 0000000000022000 [ 1434.030910] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:50:45 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x37160000, 0x0, 0x0}, 0x58) 10:50:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5424, 0x0) 10:50:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5421, 0x0) 10:50:45 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:50:45 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) (fail_nth: 3) 10:50:45 executing program 4: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:50:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf000, 0x3) 10:50:45 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 1442.980413] FAULT_INJECTION: forcing a failure. [ 1442.980413] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1442.983343] CPU: 1 PID: 7279 Comm: syz-executor.3 Not tainted 5.10.162 #1 [ 1442.984708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1442.986744] Call Trace: [ 1442.987397] dump_stack+0x107/0x167 [ 1442.988298] should_fail.cold+0x5/0xa [ 1442.989253] __alloc_pages_nodemask+0x182/0x680 [ 1442.990400] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1442.991635] ? mark_held_locks+0x9e/0xe0 [ 1442.992636] alloc_pages_vma+0xbb/0x410 [ 1442.993469] new_page+0x222/0x280 [ 1442.994328] migrate_pages+0x45a/0x23c0 [ 1442.995132] ? alloc_pages_vma+0x410/0x410 [ 1442.996183] ? buffer_migrate_page_norefs+0x40/0x40 [ 1442.997209] ? alloc_migration_target+0x4d0/0x4d0 [ 1442.998395] ? vmacache_find+0x55/0x2a0 [ 1442.999205] do_mbind+0x943/0xb20 [ 1443.000062] ? lock_downgrade+0x6d0/0x6d0 [ 1443.001095] ? __mpol_equal+0x350/0x350 [ 1443.001899] ? ksys_write+0x12d/0x260 [ 1443.002848] ? memset+0x20/0x50 [ 1443.003662] ? get_nodes+0x202/0x270 [ 1443.004581] __x64_sys_mbind+0x23d/0x290 [ 1443.005602] ? __ia32_compat_sys_mbind+0x2a0/0x2a0 [ 1443.006809] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1443.008092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1443.009291] do_syscall_64+0x33/0x40 [ 1443.010037] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1443.011056] RIP: 0033:0x7f6927d1bb19 [ 1443.011798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1443.015489] RSP: 002b:00007f6925291188 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 1443.017023] RAX: ffffffffffffffda RBX: 00007f6927e2ef60 RCX: 00007f6927d1bb19 [ 1443.018440] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffd000 [ 1443.019859] RBP: 00007f69252911d0 R08: 0000000000000000 R09: 0000000000000003 [ 1443.021341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1443.023026] R13: 00007ffc6e78f72f R14: 00007f6925291300 R15: 0000000000022000 10:50:45 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x3f000000, 0x0, 0x0}, 0x58) 10:51:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5425, 0x0) 10:51:00 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf0ffff, 0x3) 10:51:00 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5423, 0x0) 10:51:00 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:00 executing program 4: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:00 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x40000000, 0x0, 0x0}, 0x58) 10:51:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) (fail_nth: 4) [ 1458.184272] FAULT_INJECTION: forcing a failure. [ 1458.184272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1458.187006] CPU: 1 PID: 7308 Comm: syz-executor.3 Not tainted 5.10.162 #1 [ 1458.188574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1458.190479] Call Trace: [ 1458.191096] dump_stack+0x107/0x167 [ 1458.191830] should_fail.cold+0x5/0xa [ 1458.192597] _copy_to_user+0x2e/0x180 [ 1458.193394] simple_read_from_buffer+0xcc/0x160 [ 1458.194368] proc_fail_nth_read+0x198/0x230 [ 1458.195358] ? proc_sessionid_read+0x230/0x230 [ 1458.196402] ? security_file_permission+0x24e/0x570 [ 1458.197554] ? perf_trace_initcall_start+0x101/0x380 [ 1458.198726] ? proc_sessionid_read+0x230/0x230 [ 1458.199774] vfs_read+0x228/0x580 [ 1458.200583] ksys_read+0x12d/0x260 [ 1458.201417] ? vfs_write+0xa30/0xa30 [ 1458.202279] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1458.203486] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1458.204670] do_syscall_64+0x33/0x40 [ 1458.205539] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1458.206710] RIP: 0033:0x7f6927cce69c [ 1458.207564] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1458.211834] RSP: 002b:00007f6925291170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1458.213606] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6927cce69c [ 1458.215259] RDX: 000000000000000f RSI: 00007f69252911e0 RDI: 0000000000000003 [ 1458.216910] RBP: 00007f69252911d0 R08: 0000000000000000 R09: 0000000000000003 [ 1458.218585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1458.220235] R13: 00007ffc6e78f72f R14: 00007f6925291300 R15: 0000000000022000 10:51:00 executing program 4: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xcd000000, 0x0, 0x0}, 0x58) 10:51:00 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:00 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1000000, 0x3) 10:51:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:00 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xe4ffffff, 0x0, 0x0}, 0x58) 10:51:00 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5427, 0x0) 10:51:00 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2000000, 0x3) 10:51:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) (fail_nth: 1) 10:51:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3002, 0x0, 0x0, 0x0, 0x3) 10:51:00 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5424, 0x0) [ 1458.806950] FAULT_INJECTION: forcing a failure. [ 1458.806950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1458.809845] CPU: 0 PID: 7354 Comm: syz-executor.4 Not tainted 5.10.162 #1 [ 1458.811306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1458.813071] Call Trace: [ 1458.813653] dump_stack+0x107/0x167 [ 1458.814442] should_fail.cold+0x5/0xa [ 1458.815268] _copy_from_user+0x2e/0x1b0 [ 1458.816130] set_termios.part.0+0x178/0x530 [ 1458.817084] ? tty_termios_hw_change+0x1e0/0x1e0 [ 1458.818125] ? avc_ss_reset+0x180/0x180 [ 1458.818991] tty_mode_ioctl+0x520/0xf10 [ 1458.819849] ? set_termios.part.0+0x530/0x530 [ 1458.820802] ? __ldsem_down_read_nested+0xe1/0x7e0 [ 1458.821860] ? __lock_acquire+0xbb1/0x5b00 [ 1458.822771] ? __ldsem_wake_readers+0x3d0/0x3d0 [ 1458.823787] n_tty_ioctl_helper+0x55/0x3a0 [ 1458.824695] n_tty_ioctl+0x56/0x370 [ 1458.825519] tty_ioctl+0x912/0x18b0 [ 1458.826300] ? n_tty_write_wakeup+0x40/0x40 [ 1458.827220] ? tty_fasync+0x390/0x390 [ 1458.828039] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1458.829278] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1458.830389] ? do_vfs_ioctl+0x283/0x10d0 [ 1458.831256] ? selinux_inode_getsecctx+0x90/0x90 [ 1458.832272] ? generic_block_fiemap+0x60/0x60 [ 1458.833247] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1458.834306] ? selinux_file_ioctl+0xb1/0x260 [ 1458.835252] ? tty_fasync+0x390/0x390 [ 1458.836071] __x64_sys_ioctl+0x19a/0x210 [ 1458.836943] do_syscall_64+0x33/0x40 [ 1458.837763] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1458.838853] RIP: 0033:0x7f4e6d4b7b19 [ 1458.839650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1458.843563] RSP: 002b:00007f4e6aa2d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1458.845211] RAX: ffffffffffffffda RBX: 00007f4e6d5caf60 RCX: 00007f4e6d4b7b19 [ 1458.846726] RDX: 0000000020000040 RSI: 00000000402c542c RDI: 0000000000000003 [ 1458.848242] RBP: 00007f4e6aa2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1458.849778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1458.851292] R13: 00007fff8629828f R14: 00007f4e6aa2d300 R15: 0000000000022000 10:51:01 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffe4, 0x0, 0x0}, 0x58) [ 1471.938244] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:51:21 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5428, 0x0) 10:51:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) (fail_nth: 2) 10:51:21 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4000000, 0x3) 10:51:21 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:21 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3004, 0x0, 0x0, 0x0, 0x3) 10:51:21 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x100000800, 0x0, 0x0}, 0x58) 10:51:21 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5425, 0x0) [ 1479.905478] FAULT_INJECTION: forcing a failure. [ 1479.905478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1479.908177] CPU: 1 PID: 7378 Comm: syz-executor.4 Not tainted 5.10.162 #1 [ 1479.909751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1479.911608] Call Trace: [ 1479.912211] dump_stack+0x107/0x167 [ 1479.913032] should_fail.cold+0x5/0xa [ 1479.913903] _copy_to_user+0x2e/0x180 [ 1479.914771] simple_read_from_buffer+0xcc/0x160 [ 1479.915825] proc_fail_nth_read+0x198/0x230 [ 1479.916801] ? proc_sessionid_read+0x230/0x230 [ 1479.917857] ? security_file_permission+0x24e/0x570 [ 1479.918979] ? perf_trace_initcall_start+0x101/0x380 [ 1479.920125] ? proc_sessionid_read+0x230/0x230 [ 1479.921152] vfs_read+0x228/0x580 [ 1479.921953] ksys_read+0x12d/0x260 [ 1479.922756] ? vfs_write+0xa30/0xa30 [ 1479.923599] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1479.924780] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1479.925961] do_syscall_64+0x33/0x40 [ 1479.926803] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1479.927954] RIP: 0033:0x7f4e6d46a69c [ 1479.928792] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1479.932963] RSP: 002b:00007f4e6aa2d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1479.934674] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4e6d46a69c [ 1479.936280] RDX: 000000000000000f RSI: 00007f4e6aa2d1e0 RDI: 0000000000000004 [ 1479.937865] RBP: 00007f4e6aa2d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.939403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1479.940949] R13: 00007fff8629828f R14: 00007f4e6aa2d300 R15: 0000000000022000 10:51:22 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:22 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x40000000, 0x3) 10:51:22 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x0, 0x3) 10:51:22 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x10000000000, 0x0, 0x0}, 0x58) 10:51:22 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:22 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5441, 0x0) 10:51:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:51:22 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xfffff000, 0x3) 10:51:22 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x0, 0x3) 10:51:22 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 1493.211644] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:51:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:51:43 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5427, 0x0) 10:51:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5450, 0x0) 10:51:43 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:43 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1000000000000, 0x3) 10:51:43 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf0, 0x0, 0x0, 0x3) 10:51:43 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:43 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2001000000000, 0x0, 0x0}, 0x58) 10:51:43 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2020000000000, 0x0, 0x0}, 0x58) 10:51:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5451, 0x0) 10:51:59 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) 10:51:59 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5428, 0x0) 10:51:59 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x4b47, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:51:59 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf0ffffffffffff, 0x3) 10:51:59 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:59 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x8000001000000, 0x0, 0x0}, 0x58) 10:51:59 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf000, 0x0, 0x0, 0x3) 10:51:59 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x4b49, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:51:59 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x100000000000000, 0x3) 10:51:59 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:51:59 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x10100000000000, 0x0, 0x0}, 0x58) 10:51:59 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:51:59 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5441, 0x0) 10:51:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5452, 0x0) 10:51:59 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf0ffff, 0x0, 0x0, 0x3) 10:51:59 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x200000000000000, 0x3) 10:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5401, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:52:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x100000000000000, 0x0, 0x0}, 0x58) 10:52:00 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x400000000000000, 0x3) 10:52:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x0, 0x0, 0x3) 10:52:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x200000000000000, 0x0, 0x0}, 0x58) 10:52:00 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 1530.124744] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:52:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x545d, 0x0) 10:52:20 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:52:20 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x300000000000000, 0x0, 0x0}, 0x58) 10:52:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5450, 0x0) 10:52:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4000000000000000, 0x3) 10:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:52:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x0, 0x0, 0x3) 10:52:20 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:52:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000000, 0x0, 0x0, 0x3) 10:52:21 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xffffffff00000000, 0x3) 10:52:21 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 10:52:21 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x500000000000000, 0x0, 0x0}, 0x58) 10:52:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:52:21 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x40000000, 0x0, 0x0, 0x3) 10:52:21 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:52:21 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xfffffffffffff000, 0x3) [ 1554.435475] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:52:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5451, 0x0) 10:52:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:52:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x4) 10:52:44 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xfffff000, 0x0, 0x0, 0x3) 10:52:44 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 10:52:44 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:52:44 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x800000000000000, 0x0, 0x0}, 0x58) 10:52:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5460, 0x0) 10:52:44 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000000000, 0x0, 0x0, 0x3) 10:52:44 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 10:52:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0xf) 10:52:44 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x1100000000000000, 0x0, 0x0}, 0x58) [ 1576.163050] kmemleak: 30 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:53:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x40049409, 0x0) 10:53:06 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:06 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2000000000000000, 0x0, 0x0}, 0x58) 10:53:06 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xf0ffffffffffff, 0x0, 0x0, 0x3) 10:53:06 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5452, 0x0) 10:53:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5405, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:53:06 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:06 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x7ff, &(0x7f0000ff9000/0x2000)=nil, 0x5) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, r1) 10:53:06 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000000000000, 0x0, 0x0, 0x3) 10:53:06 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x2c01000000000000, 0x0, 0x0}, 0x58) 10:53:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5406, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 1600.247696] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:53:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) sigaltstack(&(0x7f0000ff1000/0xf000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:53:32 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x40086602, 0x0) 10:53:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x545d, 0x0) 10:53:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x200000000000000, 0x0, 0x0, 0x3) 10:53:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x3716000000000000, 0x0, 0x0}, 0x58) 10:53:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5407, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:53:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x400000000000000, 0x0, 0x0, 0x3) 10:53:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:53:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000fed000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000040)=0x9, 0x1, 0x2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x80000000, 0x3ff, 0x4) 10:53:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x3f00000000000000, 0x0, 0x0}, 0x58) 10:53:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000000000000000, 0x0, 0x0, 0x3) 10:53:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:53:32 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5460, 0x0) [ 1622.553798] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:53:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xffffffff00000000, 0x0, 0x0, 0x3) 10:53:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x40049409, 0x0) 10:53:52 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x40087602, 0x0) 10:53:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5409, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:53:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x1000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) 10:53:52 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x4000000000000000, 0x0, 0x0}, 0x58) 10:53:52 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:53:53 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xfffffffffffff000, 0x0, 0x0, 0x3) 10:53:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:53:53 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mmap$usbmon(&(0x7f0000ff3000/0x3000)=nil, 0x3000, 0x4, 0x104070, 0xffffffffffffffff, 0x7) 10:53:53 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:53 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xcd00000000000000, 0x0, 0x0}, 0x58) 10:53:53 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:53:53 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2, 0x3) 10:53:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 1643.812983] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:54:14 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xe4ffffff00000000, 0x0, 0x0}, 0x58) 10:54:14 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:54:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:54:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x4020940d, 0x0) 10:54:14 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:54:14 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4, 0x3) 10:54:14 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x40086602, 0x0) 10:54:14 executing program 0: mlock2(&(0x7f0000d50000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x6bcb8b4a77845779) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_alloc(0x0, 0x6) pkey_alloc(0x0, 0x0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, r1) mbind(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0x3, 0x4, 0x1) munlock(&(0x7f0000ff0000/0x10000)=nil, 0x10000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:54:14 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf0, 0x3) 10:54:14 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffff00000000, 0x0, 0x0}, 0x58) 10:54:14 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000), 0x80000) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) mmap$usbmon(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0xe, 0x13, r0, 0x0) pkey_mprotect(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x5000009, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, r2) 10:54:14 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 1652.138964] audit: type=1400 audit(1673261654.291:14): avc: denied { map } for pid=7807 comm="syz-executor.0" path="pipe:[28723]" dev="pipefs" ino=28723 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 [ 1652.147410] audit: type=1400 audit(1673261654.291:15): avc: denied { execute } for pid=7807 comm="syz-executor.0" path="pipe:[28723]" dev="pipefs" ino=28723 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=fifo_file permissive=1 10:54:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:54:14 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:54:14 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x58) 10:54:14 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4000, 0x3) 10:54:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80045432, 0x0) [ 1665.543695] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:54:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80045440, 0x0) 10:54:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:54:35 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x58) 10:54:35 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x300000c, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) 10:54:35 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:54:35 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x40087602, 0x0) 10:54:35 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf000, 0x3) 10:54:35 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:54:35 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf0ffff, 0x3) 10:54:35 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000008, 0x10010, 0xffffffffffffffff, 0x109) mprotect(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0) 10:54:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:54:35 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x58) 10:54:35 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:54:35 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:54:35 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1000000, 0x3) 10:54:35 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x4020940d, 0x0) [ 1689.055484] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:55:00 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80045432, 0x0) 10:55:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x58) 10:55:00 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000004, r0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/162, 0xa2, 0x1, &(0x7f0000000180)=""/226, 0xe2}, &(0x7f00000002c0)=0x40) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x6, &(0x7f0000ffb000/0x3000)=nil, 0x3) 10:55:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5410, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:55:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2000000, 0x3) 10:55:00 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:55:00 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80086601, 0x0) 10:55:00 executing program 0: mlock2(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x2000002, 0xffffffffffffffff) mbind(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x8000, 0x0, 0x80000001, 0x5) 10:55:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5411, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:55:00 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:00 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4000000, 0x3) 10:55:00 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x58) 10:55:00 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:01 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mremap(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 10:55:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80087601, 0x0) 10:55:01 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80045440, 0x0) [ 1711.401163] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:55:23 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80086601, 0x0) 10:55:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x40000000, 0x3) 10:55:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc0045878, 0x0) 10:55:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5412, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:55:23 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:23 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:23 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcd}, 0x58) 10:55:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x1000000, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:55:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xfffff000, 0x3) 10:55:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000000)=0x246, 0x5, 0x2) mbind(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x4000, 0x0, 0x10000c1a, 0x2) 10:55:23 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x12c}, 0x58) 10:55:23 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5413, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:55:23 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5412, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:55:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1000000000000, 0x3) 10:55:23 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x80087601, 0x0) 10:55:23 executing program 0: mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000d40000/0x3000)=nil, 0x3000, 0x1000007, 0xffffffffffffffff) [ 1734.823566] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:55:45 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x58) 10:55:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc0045878, 0x0) 10:55:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc0045878, 0x0) 10:55:45 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff2000/0x8000)=nil, 0x8000, 0x3, &(0x7f0000000000), 0x100000000, 0x5) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:55:45 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:55:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5414, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:55:45 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xf0ffffffffffff, 0x3) 10:55:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xe) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)={0x20, 0x6d, 0xc21, 0x0, 0x0, {0x0, 0x2, 0x2}, [@typed={0xb, 0x0, 0x0, 0x0, @str='[){[[}\x00'}]}, 0x20}}, 0x0) pkey_mprotect(&(0x7f0000feb000/0x3000)=nil, 0x3000, 0x2000000, 0xffffffffffffffff) 10:55:46 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x100000000000000, 0x3) 10:55:46 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:46 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x58) 10:55:46 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:55:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5415, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:55:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc0189436, 0x0) 10:55:46 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x149d9835d74cd983) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000001, r0) 10:55:46 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x58) [ 1757.043825] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:56:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc020660b, 0x0) 10:56:07 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x200000000000000, 0x3) 10:56:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5416, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:56:07 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc0045878, 0x0) 10:56:07 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:07 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000040)=0x3ff, 0x20, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:56:07 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1637}, 0x58) 10:56:07 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x400000000000000, 0x3) 10:56:07 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ff2000/0x2000)=nil, 0x2000, 0xe, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:56:07 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x58) 10:56:07 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:07 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5418, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 1770.815152] kworker/dying (7) used greatest stack depth: 23520 bytes left [ 1779.933872] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1787.179888] FAULT_INJECTION: forcing a failure. [ 1787.179888] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.182276] CPU: 0 PID: 8126 Comm: syz-executor.7 Not tainted 5.10.162 #1 [ 1787.183657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.185346] Call Trace: [ 1787.185886] dump_stack+0x107/0x167 [ 1787.186626] should_fail.cold+0x5/0xa [ 1787.187401] ? vm_area_dup+0x78/0x290 [ 1787.188172] should_failslab+0x5/0x20 [ 1787.188940] kmem_cache_alloc+0x5b/0x360 [ 1787.189795] vm_area_dup+0x78/0x290 [ 1787.190535] ? lock_chain_count+0x20/0x20 [ 1787.191374] ? lock_chain_count+0x20/0x20 [ 1787.192240] ? mark_lock+0xf5/0x2df0 [ 1787.192994] ? perf_trace_lock+0xac/0x490 [ 1787.193861] ? __lock_acquire+0x1657/0x5b00 [ 1787.194738] ? __lockdep_reset_lock+0x180/0x180 [ 1787.195710] ? __lock_acquire+0x1657/0x5b00 [ 1787.196587] ? vm_area_alloc+0x110/0x110 [ 1787.197429] ? perf_trace_lock+0xac/0x490 [ 1787.198279] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1787.199346] ? perf_trace_lock+0xac/0x490 [ 1787.200197] ? lock_acquire+0x197/0x490 [ 1787.201003] ? can_vma_merge_before+0x89/0x250 [ 1787.201949] __split_vma+0xa8/0x570 [ 1787.202692] split_vma+0x99/0xe0 [ 1787.203379] mprotect_fixup+0x669/0x8c0 [ 1787.204192] ? change_protection+0x1ad0/0x1ad0 [ 1787.205111] ? down_write_killable_nested+0x180/0x180 [ 1787.206153] ? vmacache_find+0x55/0x2a0 [ 1787.206968] do_mprotect_pkey+0x518/0x940 [ 1787.207808] ? mprotect_fixup+0x8c0/0x8c0 [ 1787.208660] __x64_sys_pkey_mprotect+0x93/0x100 [ 1787.209608] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.210649] do_syscall_64+0x33/0x40 [ 1787.211402] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1787.212471] RIP: 0033:0x7fe8b4dfdb19 [ 1787.213222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.217144] RSP: 002b:00007fe8b2373188 EFLAGS: 00000246 ORIG_RAX: 0000000000000149 [ 1787.218683] RAX: ffffffffffffffda RBX: 00007fe8b4f10f60 RCX: 00007fe8b4dfdb19 [ 1787.220122] RDX: 0000000000000000 RSI: 0000000000013000 RDI: 0000000020fed000 [ 1787.221564] RBP: 00007fe8b23731d0 R08: 0000000000000000 R09: 0000000000000000 10:56:29 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4000000000000000, 0x3) 10:56:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5419, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:56:29 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) (fail_nth: 1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:56:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x1000000) 10:56:29 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2c01}, 0x58) 10:56:29 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc0189436, 0x0) 10:56:29 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:29 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff3000/0x3000)=nil, 0x3000, 0x300001e, r0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x5, &(0x7f0000ffa000/0x1000)=nil, 0x4) [ 1787.223003] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1787.224647] R13: 00007ffcf892b08f R14: 00007fe8b2373300 R15: 0000000000022000 10:56:29 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3716}, 0x58) 10:56:29 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x1) 10:56:29 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xffffffff00000000, 0x3) 10:56:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xfdfdffff) 10:56:29 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 1801.650915] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:56:52 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0xfffffffffffff000, 0x3) 10:56:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xfffffdfd) 10:56:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, r1) 10:56:52 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) (fail_nth: 2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:56:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:56:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0xc020660b, 0x0) 10:56:52 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x58) [ 1810.418285] FAULT_INJECTION: forcing a failure. [ 1810.418285] name failslab, interval 1, probability 0, space 0, times 0 [ 1810.421653] CPU: 0 PID: 8182 Comm: syz-executor.7 Not tainted 5.10.162 #1 [ 1810.423034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1810.424705] Call Trace: [ 1810.425255] dump_stack+0x107/0x167 [ 1810.426014] should_fail.cold+0x5/0xa [ 1810.426783] ? create_object.isra.0+0x3a/0xa20 [ 1810.427707] should_failslab+0x5/0x20 [ 1810.428476] kmem_cache_alloc+0x5b/0x360 [ 1810.429302] create_object.isra.0+0x3a/0xa20 [ 1810.430215] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1810.431256] kmem_cache_alloc+0x159/0x360 [ 1810.432097] vm_area_dup+0x78/0x290 [ 1810.432834] ? lock_chain_count+0x20/0x20 [ 1810.433689] ? lock_chain_count+0x20/0x20 [ 1810.434539] ? mark_lock+0xf5/0x2df0 [ 1810.435300] ? perf_trace_lock+0xac/0x490 [ 1810.436138] ? __lock_acquire+0x1657/0x5b00 [ 1810.437016] ? __lockdep_reset_lock+0x180/0x180 [ 1810.437988] ? __lock_acquire+0x1657/0x5b00 [ 1810.438867] ? vm_area_alloc+0x110/0x110 [ 1810.439691] ? perf_trace_lock+0xac/0x490 [ 1810.440531] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1810.441592] ? perf_trace_lock+0xac/0x490 [ 1810.442452] ? lock_acquire+0x197/0x490 [ 1810.443258] ? can_vma_merge_before+0x89/0x250 [ 1810.444188] __split_vma+0xa8/0x570 [ 1810.444933] split_vma+0x99/0xe0 [ 1810.445642] mprotect_fixup+0x669/0x8c0 10:56:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') munlock(&(0x7f0000ff7000/0x1000)=nil, 0x1000) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 1810.446457] ? change_protection+0x1ad0/0x1ad0 [ 1810.447498] ? down_write_killable_nested+0x180/0x180 [ 1810.448548] ? vmacache_find+0x55/0x2a0 [ 1810.449377] do_mprotect_pkey+0x518/0x940 [ 1810.450239] ? mprotect_fixup+0x8c0/0x8c0 [ 1810.451105] __x64_sys_pkey_mprotect+0x93/0x100 [ 1810.452067] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1810.453102] do_syscall_64+0x33/0x40 [ 1810.453873] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1810.454906] RIP: 0033:0x7fe8b4dfdb19 [ 1810.455653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1810.459353] RSP: 002b:00007fe8b2373188 EFLAGS: 00000246 ORIG_RAX: 0000000000000149 [ 1810.460875] RAX: ffffffffffffffda RBX: 00007fe8b4f10f60 RCX: 00007fe8b4dfdb19 [ 1810.462308] RDX: 0000000000000000 RSI: 0000000000013000 RDI: 0000000020fed000 [ 1810.463734] RBP: 00007fe8b23731d0 R08: 0000000000000000 R09: 0000000000000000 [ 1810.465159] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1810.466609] R13: 00007ffcf892b08f R14: 00007fe8b2373300 R15: 0000000000022000 10:56:52 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x58) 10:56:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x4) 10:56:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:56:52 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x1000008) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x1000)=nil, 0x1000, 0xc4642123bcffae0c, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8001, 0x0, 0xfffffffffffffffd, 0x0) mbind(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000000)=0xff, 0xfffffffffffffff9, 0x5) 10:56:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0xf) 10:56:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:56:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x100000000000000) 10:56:52 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcd00}, 0x58) 10:56:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0xffffffffffffffff) shmat(0xffffffffffffffff, &(0x7f0000ff8000/0x1000)=nil, 0x2000) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x7, 0x80010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000003, 0xffffffffffffffff) 10:56:52 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) (fail_nth: 3) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:56:52 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:56:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:56:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x1000000) [ 1810.919216] FAULT_INJECTION: forcing a failure. [ 1810.919216] name failslab, interval 1, probability 0, space 0, times 0 [ 1810.922109] CPU: 0 PID: 8230 Comm: syz-executor.7 Not tainted 5.10.162 #1 [ 1810.923530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1810.925225] Call Trace: [ 1810.925803] dump_stack+0x107/0x167 [ 1810.926579] should_fail.cold+0x5/0xa [ 1810.927377] ? anon_vma_clone+0xdc/0x590 [ 1810.928216] should_failslab+0x5/0x20 [ 1810.928993] kmem_cache_alloc+0x5b/0x360 [ 1810.929871] anon_vma_clone+0xdc/0x590 [ 1810.930697] __split_vma+0x17c/0x570 [ 1810.931499] split_vma+0x99/0xe0 [ 1810.932218] mprotect_fixup+0x669/0x8c0 [ 1810.933070] ? change_protection+0x1ad0/0x1ad0 [ 1810.934049] ? down_write_killable_nested+0x180/0x180 [ 1810.935163] ? vmacache_find+0x55/0x2a0 [ 1810.936014] do_mprotect_pkey+0x518/0x940 [ 1810.936911] ? mprotect_fixup+0x8c0/0x8c0 [ 1810.937821] __x64_sys_pkey_mprotect+0x93/0x100 [ 1810.938800] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1810.939881] do_syscall_64+0x33/0x40 [ 1810.940670] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1810.941764] RIP: 0033:0x7fe8b4dfdb19 [ 1810.942554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1810.946461] RSP: 002b:00007fe8b2373188 EFLAGS: 00000246 ORIG_RAX: 0000000000000149 [ 1810.948068] RAX: ffffffffffffffda RBX: 00007fe8b4f10f60 RCX: 00007fe8b4dfdb19 [ 1810.949573] RDX: 0000000000000000 RSI: 0000000000013000 RDI: 0000000020fed000 [ 1810.951109] RBP: 00007fe8b23731d0 R08: 0000000000000000 R09: 0000000000000000 [ 1810.952628] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1810.954160] R13: 00007ffcf892b08f R14: 00007fe8b2373300 R15: 0000000000022000 [ 1825.827080] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:57:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xfdfdffff) 10:57:16 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000000)=0x101, 0x10000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:16 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) (fail_nth: 4) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:16 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, 0xffffffffffffffff) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:57:16 executing program 3: r0 = socket$inet(0x2, 0x80000, 0x1) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000000)=0x3, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:16 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20010}, 0x58) 10:57:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:57:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xfdfdffff00000000) [ 1833.950195] FAULT_INJECTION: forcing a failure. [ 1833.950195] name failslab, interval 1, probability 0, space 0, times 0 [ 1833.953388] CPU: 0 PID: 8258 Comm: syz-executor.7 Not tainted 5.10.162 #1 [ 1833.954952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1833.956823] Call Trace: [ 1833.957524] dump_stack+0x107/0x167 [ 1833.958385] should_fail.cold+0x5/0xa [ 1833.959249] ? create_object.isra.0+0x3a/0xa20 [ 1833.960298] should_failslab+0x5/0x20 [ 1833.961164] kmem_cache_alloc+0x5b/0x360 [ 1833.962116] create_object.isra.0+0x3a/0xa20 [ 1833.963113] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1833.964447] kmem_cache_alloc+0x159/0x360 [ 1833.965394] anon_vma_clone+0xdc/0x590 [ 1833.966446] __split_vma+0x17c/0x570 [ 1833.967300] split_vma+0x99/0xe0 [ 1833.968197] mprotect_fixup+0x669/0x8c0 [ 1833.969118] ? change_protection+0x1ad0/0x1ad0 [ 1833.970179] ? down_write_killable_nested+0x180/0x180 [ 1833.971530] ? vmacache_find+0x55/0x2a0 [ 1833.972447] do_mprotect_pkey+0x518/0x940 [ 1833.973541] ? mprotect_fixup+0x8c0/0x8c0 [ 1833.974512] __x64_sys_pkey_mprotect+0x93/0x100 [ 1833.975733] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1833.976902] do_syscall_64+0x33/0x40 [ 1833.977882] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1833.979092] RIP: 0033:0x7fe8b4dfdb19 [ 1833.980073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1833.984212] RSP: 002b:00007fe8b2373188 EFLAGS: 00000246 ORIG_RAX: 0000000000000149 [ 1833.986232] RAX: ffffffffffffffda RBX: 00007fe8b4f10f60 RCX: 00007fe8b4dfdb19 [ 1833.987843] RDX: 0000000000000000 RSI: 0000000000013000 RDI: 0000000020fed000 [ 1833.989454] RBP: 00007fe8b23731d0 R08: 0000000000000000 R09: 0000000000000000 [ 1833.991079] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1833.992693] R13: 00007ffcf892b08f R14: 00007fe8b2373300 R15: 0000000000022000 10:57:16 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:16 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20200}, 0x58) 10:57:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) (fail_nth: 5) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5420, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:57:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x101000}, 0x58) 10:57:32 executing program 3: write(0xffffffffffffffff, &(0x7f0000000000)="f8119ffb1c223d0d1e644597cd6176b3c51b6bd4ce489599f02147f2530cf054a2f2f2980099a9011400a20b67ec63732f4baf72019e8a5f97610fc0f7b3199674c8cef1d932e7c92331ff9e7c3b6e197f73de9b59d7a68f0fb3d4118da187b17bc886aa5638efefe890645a4ef797d1718723215dd49330341262b9047271d86df0c4fadd2d60135c3721b7360939e109db9f6054b227a7b84bcde0a36b583e37e3e8fa4d53e915d682caf8311ef5d6", 0xb0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:32 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, 0xffffffffffffffff) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:57:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xffffffff00000000) 10:57:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xfffffdfd) 10:57:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 1850.711954] FAULT_INJECTION: forcing a failure. [ 1850.711954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1850.714997] CPU: 1 PID: 8306 Comm: syz-executor.7 Not tainted 5.10.162 #1 [ 1850.716409] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1850.718095] Call Trace: [ 1850.718652] dump_stack+0x107/0x167 [ 1850.719404] should_fail.cold+0x5/0xa [ 1850.720190] _copy_to_user+0x2e/0x180 [ 1850.720983] simple_read_from_buffer+0xcc/0x160 [ 1850.721964] proc_fail_nth_read+0x198/0x230 [ 1850.722872] ? proc_sessionid_read+0x230/0x230 [ 1850.723815] ? security_file_permission+0x24e/0x570 [ 1850.724834] ? perf_trace_initcall_start+0x101/0x380 [ 1850.725895] ? proc_sessionid_read+0x230/0x230 [ 1850.726836] vfs_read+0x228/0x580 [ 1850.727568] ksys_read+0x12d/0x260 [ 1850.728297] ? vfs_write+0xa30/0xa30 [ 1850.729077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 10:57:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x58) [ 1850.730193] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1850.731386] do_syscall_64+0x33/0x40 [ 1850.732156] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1850.733199] RIP: 0033:0x7fe8b4db069c [ 1850.733960] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1850.737741] RSP: 002b:00007fe8b2373170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1850.739317] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe8b4db069c [ 1850.740783] RDX: 000000000000000f RSI: 00007fe8b23731e0 RDI: 0000000000000004 [ 1850.742271] RBP: 00007fe8b23731d0 R08: 0000000000000000 R09: 0000000000000000 [ 1850.743731] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1850.745192] R13: 00007ffcf892b08f R14: 00007fe8b2373300 R15: 0000000000022000 10:57:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r0, &(0x7f0000000140)="ee", 0x1, 0x800000}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000000000}, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) openat(r5, &(0x7f0000000000)='./file1\x00', 0x208000, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400c091}, 0x44001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5421, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:57:33 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, 0xffffffffffffffff) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:57:33 executing program 1: r0 = fork() r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace(0x10, r1) ptrace$cont(0x7, r0, 0x0, 0x200000000000) ptrace$setsig(0x4203, r0, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) tgkill(0x0, r1, 0x30) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRESHEX, @ANYRESOCT=r2, @ANYRES32=r2], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/keycreate\x00') r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x210802, 0x0) socket$netlink(0x10, 0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0x571}}, './file0\x00'}) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 10:57:33 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x100000000000000) 10:57:33 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x58) 10:57:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5422, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:57:33 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:33 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:57:33 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x58) 10:57:33 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xfdfdffff00000000) 10:57:33 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13002, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 1865.809294] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:57:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) 10:57:57 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x58) 10:57:57 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x73) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x2000007, 0xffffffffffffffff) msync(&(0x7f0000fee000/0x2000)=nil, 0x2000, 0x2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:57 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0xffffffff00000000) 10:57:57 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13004, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = eventfd(0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYBLOB="7f454c4600000308010000000000000000003e00000000000000000000eab7e2a200000000000000000000000000000000000000000038000200000007002000000000000000000000000000000000000000000000000000000000000000000004000000000000000101000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000005fd91bee8485c85ea35e624c2f20000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000f600"/902], 0x378) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000540)=@abs, 0x6e, &(0x7f00000017c0)=[{&(0x7f0000000080)=""/50, 0x32}, {&(0x7f00000005c0)=""/249, 0xf9}, {&(0x7f0000000180)=""/38, 0x26}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/203, 0xcb}], 0x5, &(0x7f0000001840)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x2021) lstat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f00000019c0)='./file0\x00', 0x4000, 0x20, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r2, &(0x7f0000001b40)={&(0x7f00000018c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001b00)={&(0x7f0000002cc0)={0x6b4, 0x3e, 0x4, 0x70bd27, 0x25dfdbfd, {0x1c}, [@nested={0x321, 0x54, 0x0, 0x1, [@generic="b5a853e04cfea5407743b002e1eb18dc3438670bccedefdd9dfdfb8b7680bc016b2f3f7cd5ffee285643268502bb64e74f63fa281562c7b0b1bbb332a62f78906e85a6ae45c1524bf8b21772bb72347fd2ecb91c927042afc46e18bbcacb359506592cbb8d28517adbcaf1c61e7105e87ec37f5227e2024caee99c7ff7fb48", @generic="a4fc75c11946096109ed04ccf58bb9d019f75cdd3aad8d2ee821d0664741e079fb2f6b09020609d0d0da35a8dd7df72b668925755716a1019076735d4a5e49b3776cf5ff5da25b79d661e25d481afa158ef04a2b7e60300d8cd4c43cec575ee7f37c0d319f4d2e3df22f7b72c6e4784918190cead1ce0aeb71babd5b8f43f437b7eeedcfdeaaf2f379d4f9a29295bb4a3b5cc467087dced39e30bfecef17eb3c5a3ff9fa13611c385a946e9c2de655acd44ab23f3ebcd0961f171187e4254d26fa17705d551db72a349564e555cba50e878499b26990ddbd7e3af9ec4f367ee25873c304e5", @typed={0x8, 0x54, 0x0, 0x0, @ipv4=@multicast1}, @generic="d7387b80130facde1743f0d71467f0e46d8b28eee80f9f2bc31fec1ff65701d37d56bb54d4a34dba084e910fa997a7a7eea06a4de55d6986984e7ebaee9abc4c2d9693ebeea8bd119aaa02516e011e8ee744ff2f0b698229abdf721c6129a0d66e87268f2ab1262048002ecb74bc7cfc20bbd475def1e558d832ec9124bf930faa68f7874a813cf028901a5339add37c735997dfbd755fbae061500f2667129ccfe46b17bfd59662287778aa0b17c455aa936c7f86ea887c600937ec41caad1edb44488cee68f20ee38823c7a04d15baae93285fa2efe76b572886a7bce0479655db", @generic="b8203188d951dcf02d0375af58d078dfeb0315bb63e034f1806beaa466f5f7e53d6af63c381a457a8a59ed12293ff6460184d2377d14c028b96eddfc6df4b3efeb59e05a879fbf19d0b66ea71217dc3c25e2b40695f6061f7f3a", @generic="2a29d128034f53fd95c65c764d82e9f76178eaa1367101a23a471f139dcbbf6e7770d9052e1550b7036728a8f5eb9efce6f252df2b57cde59e1820d864ac159db63b658a30255d070d7e289532702184028362a0993de5e4de5bc6d9b10f9f9e85bd07f02ea43cf262e90239c0adf4d493cc463f8a"]}, @typed={0x8, 0x28, 0x0, 0x0, @uid=r3}, @generic="67bbc948efd4224d5f5e23b5c8a458e13395e4c4893f4a6680", @nested={0x2d7, 0x10, 0x0, 0x1, [@typed={0xc, 0x22, 0x0, 0x0, @u64=0x4ab1ae53}, @generic="1442ac5fbdf0ced8f55176a144da036031c02c7a43c322f7c64297f46523dfd948b0", @generic="1de0511593a80e55860ca351bc842337d30d0e0c37aa1948488c310dd27bb959e35f9991da9bcb48ed5bf17e824b3987cdc69574d19881212ea8ccc19ee4b46bc096de8797c413b6333bf02c9f5f7ae9032aef6aa7e41feea38899bd8e2adf283cbe932e94644d4636da1b8d8b54c25dca7a1058f37afc524c7d53abb1766b7a52bfa9a3594c4cf80d002b3e09b61baad8a708f1c2ef98286db33c88f4da4974530a2196e06ece723dce4f30629924030cefccdd6c3d1a0f0122b9942c5fb342c8f4d3465741bac35c697f274fd6a9190d0542e4202b93751bb5398828f2145bcf43e9dfab5b28f0d22cf87ec886467cb2dc8502b5b3bd98", @generic="f0fcf67671190f966109a8dcb644c81c0d1f23b3a75d4af66327f71b1b9c74703be63a9d74ad4229e8281d5824ba65777588977f4db5f17a4fae0ff70a57e75d5f807930f1353dd7fabf297c73425951bb959f9a34a65ff548b0c77f524c80ea9b98ce10c9", @generic="fb19e5e15f07b470f12c20b233e7e8354c5ce46898549fce91278919da83af0ec412a30f2e341b63bd7d6d5fd240e4d43833cc47afc3da2254497dbaf7f2d0fcfbe46f2d121310ef054b85dffcb268b398d1894518b278125359244420abb68f6550820a60e7b59f41eee34d4f1d50e02a2af391d149f9a29a2d35db1df906c4371b23bf201f4cec1f291f88274b45bf6690acaf14b60739eba0e29bd770d83261d70b0abd336450c0a81c28fe4a6bec878e0d1d8c0e1440fcf823386f0b3e7fe7e3", @typed={0x4, 0x8d}, @generic="0a6b4ef95bbd760c6ab7cac9b2a2081dedf4784b9b4c4ada598b79d4fcf0ca7698238559368de07754a0c99c6514c8eb6cdcc877a9bcc49b1d64c609a21e726667cb57682d5b926292b3d622305460f9b02707cb10a796559f6a918717366d078eae2a1b0db69da9c52db8dffcf41197785d4c7a1587de7aa318ff004f259017e04e"]}, @typed={0x8, 0x41, 0x0, 0x0, @uid=r4}, @typed={0x4, 0x34}, @typed={0x14, 0x8d, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @typed={0xd, 0xe, 0x0, 0x0, @str='@}},}\xce-/\x00'}, @nested={0xc, 0x5f, 0x0, 0x1, [@typed={0x6, 0x92, 0x0, 0x0, @str=')\x00'}]}, @generic="97aa57ecf555bc426fc0761770756870de3b9843c14b739a0f350698a72cdceba26756b1931fb1ebbf008c0ce306085139b28ff76210cba6f0f1cb3bca8b2131ceddb5f212"]}, 0x6b4}, 0x1, 0x0, 0x0, 0x2880}, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r5, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_gettime(r5, &(0x7f00000000c0)) pwrite64(r0, &(0x7f0000000100)="bcd72afcc21827e16bb8e5a359fa57d5f5c02e2d9d38ef91134a120986fddfea2cad8dc7c7bc564e36f62c3052077ac6ed75265966d0cf50a407ed18ff698b00024a402fc47fd2f9da5f6dd394c021e7503f674b8da87410d6a3fdb5878abe8442a6", 0x62, 0x2) timer_settime(r5, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) timer_gettime(r5, &(0x7f0000001b80)) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:57 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:57:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5423, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:57:57 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x58) 10:57:57 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x1300a, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:57:57 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000040)={{0xffffffffffffffff, 0x2, 0x7, 0x2, 0x6ca7}, 0x0, 0x5, 'id1\x00', 'timer1\x00', 0x0, 0x400, 0x800, 0x7, 0x7}) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:12 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/reserved_size', 0x880, 0x82) sendmsg$nl_generic(r1, &(0x7f0000001440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001400)={&(0x7f00000000c0)={0x131c, 0x1b, 0x400, 0x70bd2a, 0x25dfdbfc, {0xd}, [@typed={0x4, 0x43}, @nested={0x100, 0x56, 0x0, 0x1, [@typed={0x14, 0x7f, 0x0, 0x0, @ipv6=@private1}, @generic="081e307eef945f1b91beec0811c038580d7a78787fa8f539c5815c286387cf3d71fda9a4a15b8dfb0dffd715083685f83998222dacdf149913c20842a5458c354fdbf95771aef9209b7ab7cd78f9c961d1d56c9474f3cd679166c890d70244003de1bc78f8ce9f27bee60f32744a9ccdd72297b34febbd22d5e6bc65b34b0a872ac4a70fc8e5e7163293243172f393d826128cb25a0df40a2716d6bd0bcb57ec0c5e59125f9a5c7516d90fa4ee3a0bdc8b3508bd298124372d5e09cc34c97a205242643191da035e16cf014d9fb19fb0c4eea00a", @typed={0x14, 0xe, 0x0, 0x0, @ipv6=@loopback}]}, @nested={0x18, 0x36, 0x0, 0x1, [@typed={0x14, 0x94, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}]}, @generic="5681a70af75dc7a065e03fa4820c7e3f23e9f72ee5e557d53ecb8c47e1f9fa9b526173d6f90448ebf22142f7fe19035895b46b7d8456f1f3947cb378c04d0153817b0370320f377649f6cf1c2c0c6b90890ed60deb0ac4dbe59c6a7a5fb754eaf4d216d23e1a100f6a3f5e8db91e5fd752fab86da34f12cc3c42f8e2b9418e04810fe73e0779b2e0c57163e967c316b85acae8f35e037b9507419e64fa20bf7bf4e331070d7ac640a66ad2fd8e6e6d28bd968228ad1e99d6b84782401d50299202a4bb3bb50a7347808b723c", @typed={0x8, 0x3f, 0x0, 0x0, @u32=0x7fff}, @generic="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", @generic="d44ecf8171770378c357d9bf5599b3619ce0b789b324cd6c8f1baa500e00d280a222627f36a5504227e9a68093f4d9e675ee96f22da618e61841396a79bcda1810a697a83a98a884452dcc26be8f0e46bf5ea4ddaf6d419758126b3d4f", @typed={0x8, 0x2, 0x0, 0x0, @pid=0xffffffffffffffff}, @nested={0xae, 0x56, 0x0, 0x1, [@generic="e780daf4a5495cacacf2444ab41e6a38800e1c0fdd39d964e7378b5bcc6ac1714d1bdd6934785624aa478831adbc12e388f38b5b65ad5c409bf7a6d7adaabe0e48c2e2e509f381cae938b41adecba0ea2abdff14f5f0a4c71f1e68f472f41da5d74b6e6ba7f110df7d826ffb9a6488e175897cfea30d833325358b0414e022242645a10594e3", @generic="b84cd0178648b574e5967735cbae99e92c6478ac589eb5af924022ba", @typed={0x8, 0x14, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x23}}]}]}, 0x131c}, 0x1, 0x0, 0x0, 0x20008001}, 0x40081) 10:58:12 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000200}, 0x58) 10:58:12 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x1300c, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5424, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:58:13 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:58:13 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fe4000/0x12000)=nil, 0x12000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4, 0x0) 10:58:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x60440, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:13 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x1) pkey_alloc(0x0, 0x2) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000ff8000/0x8000)=nil, 0x8000, 0x8000, &(0x7f0000000000)=0x4, 0x7, 0x1) madvise(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x12) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) 10:58:13 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x0, 0x3) 10:58:13 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x58) 10:58:13 executing program 3: r0 = fsmount(0xffffffffffffffff, 0x1, 0xc) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f0000000040)={{r1}, "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"}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, 0xd, 0x3) 10:58:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) readv(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000000040)=""/65, 0x41}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/12, 0xc}, {&(0x7f0000001100)=""/77, 0x4d}, {&(0x7f0000001180)=""/12, 0xc}, {&(0x7f00000011c0)=""/128, 0x80}], 0x6) 10:58:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5425, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:58:13 executing program 6: fspick(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x9) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:13 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:58:13 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x58) 10:58:13 executing program 3: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="71f6a4dd72f3cd29ba8cb6f19d5214bc9e72042540ed5c3bbe32d7b3b86258a0e80a29328e64f21b9a895efefda351947ebf3459d3ea3ba7f18a4c2dad5bae5539dcfe057e6f5ee93352552e3879e918f4a54017c1a8ee35774e496d856e96a3fe859019841229a9b2f5a8d099e5173bad43d140599ae8f5b41809f9ebcd51a454e2b4282d8131", 0x87, 0x100}], 0x40000, &(0x7f0000000180)={[{}, {'\xa1@:'}, {'$'}, {'-'}, {}, {}, {'\xa3-&'}, {'*'}, {'&'}], [{@fowner_lt={'fowner<', 0xee00}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+&]%['}}, {@permit_directio}]}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:13 executing program 3: mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) dup2(r2, r0) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:13 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x2, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:13 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2c010000}, 0x58) 10:58:13 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0xc2) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) readv(r1, &(0x7f0000000200)=[{&(0x7f0000000040)=""/218, 0xda}, {&(0x7f0000000140)=""/19, 0x13}, {&(0x7f0000000180)=""/85, 0x55}], 0x3) [ 1903.547375] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:58:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000100)=0x81) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) connect$netlink(r5, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5427, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:58:34 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x3, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:34 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:58:34 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x37160000}, 0x58) 10:58:34 executing program 6: openat$vcs(0xffffffffffffff9c, &(0x7f0000000240), 0x20000, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000200)=@generic={0x3, 0xfffffffffffffffc, 0x8}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x17, 0xa, 0x301, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x4044094) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:34 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000fee000/0x1000)=nil, 0x1000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/129, 0x81, 0x1, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) 10:58:34 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:34 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff0000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000000)=0x9, 0x0, 0x2) mlock2(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x0) [ 1925.050226] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:58:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5428, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:58:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="e3a52f9908bb8835a45087379fb63224b29455dc783c5c07d18e07bac5d88a0a6f290beffa1230f8c6c01309ffcb60a346036a94c5489427d10bb5ec3e2fc56071828a681290f6cb0000000000", @ANYRESDEC=r0, @ANYRESHEX], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='pagemap\x00') close_range(r1, r2, 0x2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:55 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x58) 10:58:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:55 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:58:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x14d182, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x7fffffff, 0x81, 0x5, 0x4}) mount$9p_rdma(&(0x7f0000000080), &(0x7f0000000100)='./file1\x00', &(0x7f0000000200), 0x1800, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x8}}], [{@dont_appraise}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@obj_type={'obj_type', 0x3d, 'rfdno'}}, {@seclabel}, {@audit}]}}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0xff91, 0x2, 0x2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) madvise(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0xf) 10:58:55 executing program 3: r0 = semget(0x2, 0x2, 0x1) r1 = semget$private(0x0, 0x6, 0x0) semop(r1, &(0x7f0000000040)=[{}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$GETPID(r0, 0xc3fd6d7e35f68458, 0xb, &(0x7f0000000040)=""/4096) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x100004, 0x3) r2 = semget$private(0x0, 0x6, 0x0) semop(r2, &(0x7f0000000040)=[{}], 0x1) semop(r2, &(0x7f0000001040)=[{0x0, 0x3}, {}], 0x2) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mbind(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000000)=0x3ff, 0x383, 0x4) 10:58:55 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x58) 10:58:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0xffffffffffffffff) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x81, &(0x7f0000ff9000/0x4000)=nil, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x118000, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESHEX=r1, @ANYRES64, @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000003, 0x1010, r1, 0x366) 10:58:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5429, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:58:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xa, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:55 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:58:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:55 executing program 0: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000000)=0x6, 0x0, 0x6) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fef000/0x2000)=nil, 0x2000, 0x7, r0) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, r0) 10:58:55 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcd000000}, 0x58) 10:58:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5432, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:58:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xc, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:58:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0xc) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:58:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000002000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0ffff09000000ff0f0000000000000600000000000000f7ffffffffffffffff0700000000000000000000000000000000000000000000000000000000000001000080080000000700"/320]) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) getpeername$netlink(r1, &(0x7f0000000380), &(0x7f00000003c0)=0xc) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="010e"]) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r3, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)={0x14c, 0x0, 0x55034ed44ca02da9, 0x70bf2a, 0x25dfdbfb, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0xffffffff}}, {0x8}, {0x6, 0x11, 0x3ff}, {0x8, 0x15, 0xffff}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x200}, {0x6, 0x11, 0x3ff}, {0x8, 0x15, 0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xfff}, {0x6, 0x11, 0x1}, {0x8, 0x15, 0x40063d}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0xffd}}, {0x8, 0xb, 0x7f}, {0x6, 0x11, 0xff}, {0x8, 0x15, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x1f}, {0x6, 0x11, 0xff}, {0x8, 0x15, 0x20000004}}]}, 0x14c}}, 0x4004090) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000240)={0xffff, 0xa3e, 0x8, 0x8001, 0x5, 0x6}) r5 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) 10:58:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2, 0x7) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) mmap$usbmon(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0x4, 0x40010, r0, 0x6) [ 1947.386085] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:59:18 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:59:18 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000040)={0x9, 0x9, 0x800}) r2 = fork() ptrace(0x10, r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000140)="5c58057d7125e52bedf09bc5e551d2131d0cea5fea49aa3c9c0ef8c48cd12b6dc8ba4a5c11b36f850860ab4a3bf736a67b8bdc04625481c7122fb8362eb0eff316f6a8d73052902998f297e3e2b3cdb61a16ab7ca5bf67f976e0dff1f199eb6097be13b8adc4b8988a871e03a9c8") ptrace$cont(0x7, r2, 0x0, 0x200000000000) ptrace$setsig(0x4203, r2, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) syz_open_procfs(r2, &(0x7f0000000080)='net/llc/socket\x00') 10:59:18 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff}, 0x58) 10:59:18 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xa00, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:59:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5435, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:59:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x1ff) 10:59:18 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa691352a7abcf9cb, 0x4000010, 0xffffffffffffffff, 0x636) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000feb000/0x3000)=nil, 0x3000, 0x8, r0) mbind(&(0x7f0000fed000/0x1000)=nil, 0x1000, 0x3, 0x0, 0x1, 0x3) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0xd6b96) 10:59:18 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0xc, r1) pkey_alloc(0x0, 0x0) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x37f21a5fef682871, r2) mbind(&(0x7f0000ff3000/0x1000)=nil, 0x1000, 0x2, 0x0, 0x7ff, 0x7) mremap(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x12000, 0x3, &(0x7f0000fee000/0x12000)=nil) r3 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, &(0x7f0000000140)=0x2, 0x1d, 0x2) r4 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0x3, 0x40, 0x20, 0x6, 0x0, 0x5, 0x40, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000100)}, 0x80, 0x8, 0xfffffff8, 0x3, 0x7fffffff, 0x805, 0x400, 0x0, 0x2, 0x0, 0x4}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xc) sendfile(r3, r4, &(0x7f00000000c0)=0x6, 0xc2fb) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000006, r0) 10:59:18 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xc00, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 1968.697009] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:59:45 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:59:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:59:45 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:59:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ff1000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0xffffffffffffffff) 10:59:45 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffe4}, 0x58) 10:59:45 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) remap_file_pages(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000006, 0xcc7, 0x2) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000, 0x7, &(0x7f0000ffc000/0x4000)=nil) 10:59:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='auxv\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ftruncate(r2, 0x7f) ftruncate(r2, 0x5) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, &(0x7f0000000080)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:59:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5437, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:59:46 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x3, 0x7ff, 0x0) 10:59:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5441, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 10:59:46 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000800}, 0x58) 10:59:46 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:59:46 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x404ac4, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:59:46 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280), 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 10:59:46 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:59:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) clock_gettime(0x0, &(0x7f0000005480)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005340)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000002280)=[{&(0x7f0000000100)=""/109, 0x6d}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/4, 0x4}, {&(0x7f00000021c0)=""/186, 0xba}], 0x5, &(0x7f0000002300)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}], 0x148}}, {{&(0x7f0000002480)=@abs, 0x6e, &(0x7f0000003800)=[{&(0x7f0000002500)=""/215, 0xd7}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000003600)=""/123, 0x7b}, {&(0x7f0000003680)=""/158, 0x9e}, {&(0x7f0000003740)=""/78, 0x4e}, {&(0x7f00000037c0)=""/40, 0x28}], 0x6}}, {{&(0x7f0000003880), 0x6e, &(0x7f0000004d00)=[{&(0x7f0000003900)=""/212, 0xd4}, {&(0x7f0000003a00)=""/4096, 0x1000}, {&(0x7f0000004a00)=""/10, 0xa}, {&(0x7f0000004a40)=""/250, 0xfa}, {&(0x7f0000004b40)=""/36, 0x24}, {&(0x7f0000004b80)=""/182, 0xb6}, {&(0x7f0000004c40)=""/150, 0x96}], 0x7, 0xfffffffffffffffd}}, {{&(0x7f0000004d80)=@abs, 0x6e, &(0x7f0000005000)=[{&(0x7f0000004e00)=""/233, 0xe9}, {&(0x7f0000004f00)=""/200, 0xc8}], 0x2, &(0x7f0000005040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}}, {{&(0x7f0000005180), 0x6e, &(0x7f0000005300)=[{&(0x7f0000005200)=""/111, 0x6f}, {&(0x7f0000005280)=""/65, 0x41}], 0x2}}], 0x5, 0x41, &(0x7f00000054c0)={r2, r3+10000000}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendmsg$nl_generic(r1, &(0x7f0000005e00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21000130}, 0xc, &(0x7f0000005dc0)={&(0x7f0000005500)={0x8a8, 0x2a, 0x8, 0x70bd25, 0x25dfdbfc, {0x20}, [@nested={0x22f, 0x7d, 0x0, 0x1, [@generic="c8c1c18e06367af7fcf5c1ab8eb304538092aa1154d035501aa7783a25df639b7a4341eb98acd1ad75b7b2e5", @generic="68aea9c06c8ccaa2ec687bd0d2b05198fdd058", @generic="fd3aa2d37bb101fcae77a1e43a3b9be87c08130a40e33ae5c7ba4f3b3886234502b426b25bb3f5113f193e03c8b7e56fa2c7110c4bb3cf6aa7cdb78dd0575e8aaea5fdaa99cdc6595f432158c2c9f859a2c15e8cc18d3db34600c66932587d249224beeba2086513334b793ac40071897ba57061853bcbb08c3c7d59341579dcd51732cf95643888307f10cfb54ec1a251368b6ae941c0b4c3d5f01e90cc43504e15745a7165367892c4753a7a22acb22a8260312f82b42b3e", @typed={0x8, 0x3, 0x0, 0x0, @uid=r4}, @generic="c53b79d6ceedc9e63611e4c772ec4c971b613af218e772f26dad0d098972c7a35214a671890b085e8e02e48fdd64c7ec9565624343faed733da7dc19b79f036eacf240decc97b4baa196b094d9e7eeb1b5ed28ab2583df89621bd58a69a025f7bf8018a89e2cf07a77d58f19e23bf76b91273927b9efc319ac962d02e64e64ec7baaff", @generic="3cc0c66e7197aeffab7befb84448a680ab335ce09ef3c9705b8e0c94aa64468d2fcb4688a48723be83cf7b748a352fd8ebc4833e1e53404024ce2d2efd0581141c76bad67e580141e9bc8f79fc69565d4f1e9134bc5debfff96d4e51ee20e3ef8e3c61b2edf2ecbcb6", @generic="c7b67ca70c00eba40602025d21bc4a4d677d9d75bd8735992621ae6cdade868df35f4670b5daf2", @typed={0x4, 0xf}, @typed={0x14, 0x32, 0x0, 0x0, @ipv6=@remote}]}, @nested={0x230, 0xf, 0x0, 0x1, [@generic="68d51fab5fdfaf412deaea7ca870f2b167483d251b27d27c4465236c0be902a287fa9a1158f77f0d129a2036c774cfd94bf0627ce461164fcea610e78a21f37c77080537741dfc637a7913da26f5cdace50feb9df2f6f126c2ece136510c4728e3263ec13ed221abe045a2e8eafe09027da2069dc6d909fdc24a3956d499a4452431cab9a95ebaaf6d64658c700e4b95871d571c4e141e5874d8d93828405d78ed6ffbbd8ee014d4864d43cc55249145d4b73a21203c48f87168b798b48c02cf6cf011a2a604c067c336100c786437cfc866badd53a8fa76f7024caa1a8357", @generic="9a6ec77dbb7215a198b345f916aaec1655c3ac8df78812956ca37416a908a3b70c3189b36c2689af337a6eb02031e8c9595d1e8b7cdc02cc6db0b82247c19f312e733600ef456891fc3fcd45db1b89faec08be65000980d93d734a6ee658e5534ef17ec9f0f3b49593a54cec643777657c43df5137b3027e", @typed={0x8, 0x58, 0x0, 0x0, @fd=r6}, @typed={0x14, 0x77, 0x0, 0x0, @ipv6=@remote}, @generic="9182898fe38b3fc3648806bb149bb780dcfad87e022765b93568a53d454beea931da1d65259a6c059c82da46ea5b4a148ab1be5f7c3838ad524786bce3df5f10e1c46d297f1b84851d77577bf653b21d4546c144665149852cf97592f3a5868a818b0992dd74c1bab01795e8071ccfbd2fdedeb5d6966331ba7ef819e2975ce156a9479f8cd2712fb133c79f2389ee1e6d721a5a3455fb802f75b3d7d1b77b4731e8607cd83769c5f45fc74295ea19711c220e0411a355472f"]}, @nested={0x3cb, 0xd, 0x0, 0x1, [@typed={0xfa, 0x3e, 0x0, 0x0, @binary="cd0851ad545467a4b1c764a1b8f0d53f0c21a9286acac6438e4d62f8131f8673af2da87b5784adf05921bea8449c537d5d0f92f372b3c78e9c6b0a8502a186209ddf1e871dcfbecafd7f3ba901ce3d6d7fc6212385fd6882149d92f0ce523dac5997249b1d07e5f8608dc10b80d2b61cb43355db4d6c4c4eec65981025842100c651d39da17ab7962591840a69330aeb6589247067dabe4cc9bb3606c374282f0390d7b0b3da5199f2c903c62cc5b313f9e71714560f7f45a20081d1203f49caba246234635f40464df126d1dccf6470fc774a00c7b5991be695d9a219f47f37ba59aca03e1d652f6ec7048d85f95415481d86e02824"}, @typed={0x8, 0x42, 0x0, 0x0, @uid=0xee01}, @typed={0x4, 0x59}, @generic="b62c64b3b39f72e14d381339e5cb283bdf6168c3e7a05f655f17b0503cd48c79387e715088201cd20b0b9b6da67f66b82b704f8ed897f7b7ece8ae8b1caf68c8e1cb3aed0fdaa8aa019f384d1bd9fea391e4cd4c9a14501b007f85283aaba81e", @generic="be9415524649aeaef777d56c61a3cab606aa90a9dc12610503be51392c3b8b462de36968b08a2a9c4363890e0725aff54e4695282a44b6505c2ce0dd254edab6767273761f4fc1a957050285dfe0e10204b7f33940e6ba81d797c14444d9ee211525b562c99385f3ae0fadda3b5f2c9a8089ca97ce6e5bef34fb1875e4d44ab4d732cb1fb3e911e3a3e12edac973e90e472af33647e0b9c3fcb219a5b78b69bbfefce9386f55", @generic="0cf7915cdbfe5e4c133077aa4a132d720027601255517e8ad2ebb203baa6472ed93d384e3708bb578604e665f3055c5a63ba64b57d86be465ce1e9a40b4050533de3140980d1a179fa3183d014cc657bdc683cf6b7b16b41fcc7bdcc73852d76815b695163bd82241ba3a846b8fd753d94e3e0f1644450d7a389ae31f9e11fcf003d8de32d09c8b3adaa8b8b3688931f57001cffd577eca1a7ddb9c4484b9b48bcbaa1e9a52091d22aa5c8526cbc0df7446a9b9604640302ca08c6d7e1617117fc28454ead0cf90c7baedad3306e434077cbe4e1", @generic="ca8319a1478248ad8927c51b3b1199fdc8d119e3330af9912845e1afabe9b332d8014f566aaa40f9094aa34077935bcd2cfa733338370b16b4baa2d03475cf7d95066ddc18e867795ce1c82bed974ea594d3ef7192", @generic="5b260b534007d4ec0f01fb747077bdf0d5dc9158ae0408684d4a763be50e6a996f13e343cb36e48454186c12d10927054a4704a41c58207452e15c2c1de324d6694a0ed4a2d0d40d0a443876b352546a1cbcfb9b0b61b3d3296e9a409a19a86d3c7f69066eaf68f7d88e55548d2a6ed5aef956a4aee3a2c486b6f8f8ba44cd73d5f365d9c2174bde25e87dec12001bb3"]}, @generic="bb6bad9274e5d938e7642f69365481daf339dd76e35f64fdccb1a6c985d20990f3229b60ac43e5fed2a5d96904ea6916c70f6f3b473932f5b451962bcbc18f8decb7eacb3b903d252b1891cb8ee71966b570f2e25d3cc7bd2bb9256295dd3060", @generic="5f9e3b4b73d89c"]}, 0x8a8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4048000) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 10:59:46 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x2000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 10:59:46 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x58) [ 1998.887478] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:00:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0xa20400, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) lseek(r2, 0x81, 0x1) 11:00:08 executing program 0: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x5000940c, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4001, 0x0, 0x0, 0x4) 11:00:08 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2001000000000}, 0x58) 11:00:08 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x8000, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x8, r0) 11:00:08 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x3000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5450, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:00:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x141040, 0x0) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ftruncate(r2, 0x4) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000100)=[r3, r5], 0x2) 11:00:08 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280), 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:00:08 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, r0) 11:00:08 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2020000000000}, 0x58) 11:00:08 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8000, 0x0, 0x1a83df54, 0x3) r0 = pkey_alloc(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1, 0x6}}, './file0\x00'}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0xa, 0x0, 0x0, 0x52e8, 0xd, 0x0, {0x0, 0x0, r1}}, 0x400) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, r0) 11:00:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5451, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:00:08 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:00:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) fcntl$getflags(r1, 0x3) 11:00:09 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280), 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:00:09 executing program 3: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) pkey_mprotect(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x3000007, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:09 executing program 0: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)=0xe7cf) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff0000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000040)=0x20, 0x5, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x2000000, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:09 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x8000001000000}, 0x58) [ 2020.585887] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:00:31 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{0x0}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:00:31 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xa000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) r3 = socket$netlink(0x10, 0x3, 0x15) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x428002, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3}, './file1\x00'}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:00:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000000c0)={0x1f, 0x28, '\x00', 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:00:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5452, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:00:31 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000040)=0x9, 0x2, 0x2) mlock2(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0, 0x3) 11:00:31 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0, 0x3) 11:00:31 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10100000000000}, 0x58) 11:00:31 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x11000, 0x4, &(0x7f0000f12000/0x11000)=nil) pkey_mprotect(&(0x7f000069f000/0x3000)=nil, 0x3000, 0x1, 0xffffffffffffffff) 11:00:31 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xc000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:31 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mremap(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ff8000/0x2000)=nil) 11:00:31 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x501640, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="07219b39707878c1ef58ed761deb50cafc0a06e62ef3d3e52b8ea1f40d307566ad828aabe4a51e904939b64093b8d4ca3a5b58ed161250af8318bb7605dca0d2cd904853c672b5898ac3a79ca253fd1519c88a1cc651a380c67f5a3563a202e378509d4d7ef565b7a8b99deb377fb480962d86d4504752f328811e520a0a2bf3266bf7004ab5c2320f1457d40808072ea45dd34ddc1d94dc0b861a1e55ed8d79c4b1d66bda5fa1aa74a58bc50b0b2492bb1d77a577c352d5be530eb51d7305ba7c19cbe7aec04fdd92"], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) dup(r1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x1, 0x9, 0x101, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x6}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) 11:00:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5456, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:00:31 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x58) 11:00:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x4) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) splice(r0, &(0x7f0000000080)=0x100, r2, &(0x7f0000000100)=0x2, 0x0, 0x2) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:00:31 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{0x0}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:00:31 executing program 3: mlock2(&(0x7f0000fee000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x7, &(0x7f0000ffc000/0x4000)=nil) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 11:00:31 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x58) [ 2041.390018] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:00:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5457, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:00:51 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x40000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:51 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x58) 11:00:51 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1418c2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="afeb4f1405000000000000000000000000adb5178f8d3a726537e70bec688bcc341b95eb77d0841eb915b53a0e96e1dd181b6e59602eaeaa54cf9ea815533b891963fa148aba22c34a"]) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x6, 0xd4, 0x6e, 0x0, 0x6, 0x90000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfff, 0x0, @perf_config_ext={0x0, 0xffff}, 0x2, 0x3, 0x1, 0x6, 0x7, 0x47, 0x4, 0x0, 0xe44, 0x0, 0x3}, 0x0, 0x9, r2, 0x2) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) pread64(r2, &(0x7f0000000100)=""/188, 0xbc, 0x5) 11:00:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0xfff, 0x4, 0x8, 0xf4, 0x8, "250988c8911a9821c9c61d6b32469f8b7e0514"}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0xe, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000801) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x2c, 0x2, 0x7, 0x0, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xfffffffffffffff7}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8084}, 0x4c000) 11:00:51 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x8, r0) 11:00:51 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{0x0}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:00:51 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff3000/0x1000)=nil, 0x1000, 0x3000008, r0) mbind(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x3, &(0x7f0000000000)=0x1000, 0x3, 0x0) 11:00:52 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0x58) 11:00:52 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x300000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:00:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3000006, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x100000000000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:09 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x9, 0x2) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) 11:01:09 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:01:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x240000, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2a9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000004}, 0x20008100) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:01:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfdtuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:01:09 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x58) 11:01:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x545d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:01:09 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000004, r0) 11:01:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x200000000000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:09 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x454f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000280)=@IORING_OP_TEE, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_CLOSE={0x13, 0x4}, 0x200) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2}, 0x1000) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) r5 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x20000000}, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="7472616e73c3739a828a0e61894f05e1c53d01e63d66642c7266646e6f3d", @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) io_uring_enter(r8, 0x46e4, 0x54a8, 0x1, &(0x7f0000001280)={[0xffffffff]}, 0x8) io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0xa, 0x0, r6) syz_io_uring_submit(r0, r3, &(0x7f0000001240)=@IORING_OP_READV=@pass_iovec={0x1, 0x5, 0x4004, @fd_index, 0x3, &(0x7f0000001200)=[{&(0x7f0000000000)=""/246, 0xf6}, {&(0x7f0000000100)=""/230, 0xe6}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x3, 0x4, 0x1, {0x0, r6}}, 0x101) 11:01:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5460, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:01:09 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, 0x58) 11:01:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) 11:01:09 executing program 3: mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x800000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmat(r0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) 11:01:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:01:09 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:01:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x400000000000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:09 executing program 3: sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000040)={0x37c, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x9c, 0x2, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_STRSET_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x2c, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x130, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xf}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x140, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xa}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xd}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x37c}}, 0x800) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mmap$IORING_OFF_CQ_RING(&(0x7f0000fed000/0x4000)=nil, 0x4000, 0x2800004, 0x11, 0xffffffffffffffff, 0x8000000) 11:01:09 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff4000/0x4000)=nil, 0x4000) 11:01:09 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x58) 11:01:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xa00000000000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:09 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa8b3b47212136f32, 0xffffffffffffffff) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x640000, 0x0) mmap$usbmon(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000006, 0x50, r0, 0xf6) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:01:09 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:01:09 executing program 3: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000009, 0x20010, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x454f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000280)=@IORING_OP_TEE, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_CLOSE={0x13, 0x4}, 0x200) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2}, 0x1000) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r0, r3, &(0x7f0000000100)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x25, 0x1}, 0x6) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mincore(&(0x7f0000ff8000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/255) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x28e02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) creat(&(0x7f0000000000)='./file0\x00', 0xc0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:01:09 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x2c01000000000000}, 0x58) [ 2082.031370] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:01:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x208d02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYRES64=r2, @ANYBLOB="9b3cec188a3717dd0d5a3bec0202e5792f39f66b3a5b99279b82348afa56fccd8bb3695ad8d3241cbba0eaaaa5d34b54cc9fbd4afd1f38cc4db27d794ae5f6e3af9c1fac1dab4cb37bdf61c5625a58b6a6c87752abfeb1496d208491d8d89a21bdf36458873e4a93bff07d9cf409666cfe8c4d99fd85363284ee64824a03fb02", @ANYBLOB="19b40c62dfbeb82f9f760538ca1f54f6440b38c6111a0afc7f9a7f6c66068b387658b6c8801a5d267eb01e6c71236853d478c15a6ed28d0098b7286e4058814abe724c", @ANYBLOB="082d8424b491b7c6fc9aae3cb3a2600129b4a2c0f5bfe009c1152af23cf16cd58884811a0e51e68d34e614205186cae93dd408cca9127348d247a6e1550a4d0903c097a8c9bee65faafd8478a3670591352f047e53c7a13c0e24bf2c292ec51616903bf3680a9cdcbb94949bf50c2645d630d540095c192445526345b3852e64693ce4cbd29723bb12e5118ea6b964ef95739ea294c8cd3726c8af83641b8843a2e66580c23fee4639500d9398c98c9a742e7cd9329dceefaed67ad410aabb5a19417f000000ada2e9aa81e2096cb1f8f01491377ab7caed0bb106fef38ab674d595d2e93c", @ANYRESDEC=r1, @ANYRESHEX], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:01:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xcc2b362b54eaea12, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x200240, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:01:32 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, 0xffffffffffffffff) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:01:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40045436, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:01:32 executing program 0: mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x3, 0x1) 11:01:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xc00000000000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x2, 0x3, 0x1) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000040)=0x9, 0x6, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x9, &(0x7f0000ffc000/0x2000)=nil, 0x3) 11:01:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3716000000000000}, 0x58) 11:01:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000000000000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x100000c, r0) 11:01:32 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x58) 11:01:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40049409, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:01:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0, 0x3) 11:01:32 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, 0xffffffffffffffff) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:01:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x2) [ 2105.239210] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:01:56 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, 0xffffffffffffffff) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:01:56 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$FIONCLEX(r2, 0x5450) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:01:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) socket$netlink(0x10, 0x3, 0x7) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r1, 0x942e, 0x0) 11:01:56 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = dup(r0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x7fffffff, @private1, 0xfffff001}, 0x1c) 11:01:56 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x58) 11:01:56 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80, 0x5) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000fed000/0x4000)=nil, 0x4000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:01:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40086602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:01:56 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, r1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 2128.677253] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:02:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) r2 = io_uring_setup(0x6102, &(0x7f0000000040)={0x0, 0x5249, 0x8, 0x3, 0x1d4}) fcntl$dupfd(r2, 0x406, r1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:02:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40087602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:02:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x101, &(0x7f0000ff9000/0x2000)=nil, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:02:20 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xcd00000000000000}, 0x58) 11:02:20 executing program 7: pkey_free(0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000000)=0x60, 0x2, 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000080)=0xceb9, 0x0, 0x5) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:02:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$KDDELIO(r1, 0x4b35, 0x6) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:02:20 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:02:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x8, 0xffffffffffffffff) r3 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x2, r3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, r0) r4 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r4) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r4) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000008, r4) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3, 0x0, 0x4, 0x6) 11:02:20 executing program 0: mlock2(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x0) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ff2000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) munlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) mmap$usbmon(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0xb, 0x4010, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x2, 0x2) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x4, &(0x7f0000ff9000/0x4000)=nil) 11:02:20 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:02:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x4020940d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:02:20 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000}, 0x58) 11:02:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mlock2(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:02:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440), 0x503880, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r2 = socket$nl_generic(0x10, 0x3, 0x10) syncfs(r2) r3 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x5, 0x1, 0x8, 0xfffffffffffffffc}) r4 = socket$netlink(0x10, 0x3, 0x4) r5 = getpgid(0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) kcmp(0x0, r5, 0x5, r1, r6) r8 = socket(0x26, 0x4, 0x5) sendmsg$nl_generic(r8, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x30, 0x200, 0x70bd2c, 0x25dfdbfe, {0x5}, [@typed={0x8, 0x84, 0x0, 0x0, @uid=0xee00}, @generic, @typed={0x8, 0x1d, 0x0, 0x0, @fd=r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x240000d4}, 0x0) preadv(r8, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000240)=""/140, 0x8c}, {&(0x7f0000000300)=""/249, 0xf9}], 0x3, 0x94dd, 0x80000000) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000180)={0x4, 0xfffa, 0x6, 0x40, 0x3, "e082be6c59fa96b6"}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:02:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x3ff, 0x1f, 0x3}) 11:02:20 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:02:20 executing program 7: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="5e64616e735466012c726e6f3d0000", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB='(\x00']) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r1, 0x5000940f, &(0x7f0000000040)={{r2}, "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"}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xf, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) fcntl$setstatus(r3, 0x4, 0x6000) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, &(0x7f0000000000)=0xa, 0x8, 0x1) lseek(r1, 0x9, 0x2) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(0xffffffffffffffff, &(0x7f0000001080)={0x24, @none={0x0, 0x3}}, 0x14) dup(r5) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="748a616e733deb80290a23b1ee221d38ef723532f5bdeb3e9264c0aa9faad8b8", @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) write$P9_RAUTH(r6, &(0x7f0000001040)={0x14, 0x67, 0x1, {0x10, 0x1, 0x1}}, 0x14) 11:02:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:02:20 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x58) [ 2151.238568] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:02:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000000c0)={0x1, 0x0, &(0x7f0000000080)=[r0, r0, r0, r0, r1, r0]}, 0x6) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x4) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:02:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:02:42 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:02:42 executing program 7: mlock2(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54bf, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x141003, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x3, 0x1, 0x7f, 0x0, 0x9, 0x1254, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040), 0xc}, 0x2240, 0x1000, 0x401, 0x5, 0x7f, 0x8, 0xf3dd, 0x0, 0xdb, 0x0, 0x4a75}, 0xffffffffffffffff, 0xb, r0, 0x3) 11:02:42 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000002, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 11:02:42 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x57) 11:02:42 executing program 6: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans3fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) vmsplice(r0, &(0x7f0000000340)=[{&(0x7f0000000240)="1f0b6fea1efe40a61b65a0ab4b32499149fb94e561e915b70465d57916a9f64394826a69dc9e31936231992cc87261bc68d52753334fcde588c32eeae088dce26999be295fdc116c940f025f30d45f7d94368efc0097b329e435314ab8a38e6ede55c1db1a89ce11ee4352e4ba0585e4a043451f360c20c3e70c6c84149d3d8fee32acb82831f4e9b4a48a47f1140901397033041eb51443b088dc3c9bd4619bd7e77000d04c411d3e64649d9ab8821b2a13954ba5ae4f86e7d1cadd5556ae539cce3de5f639ddaaec0da6444e0da7d6e333375f4c99318a12fca80e72", 0xdd}], 0x1, 0x4) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000040)={'filter\x00', 0x0, [0x100, 0x7, 0x5]}, &(0x7f00000000c0)=0x44) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000380)=0x1) creat(&(0x7f0000000100)='./file1\x00', 0x4) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000200)) 11:02:42 executing program 3: ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x2) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x100000e, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 2174.216789] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:03:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRES32=r0], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) dup(r0) 11:03:04 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r1) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r4, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x7, 0xfff, 0xfffffff7, 0x10001]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x24008080) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:03:04 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x4000, &(0x7f0000000040)=0xffffffff, 0x6, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) mmap$usbmon(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x1000011, 0x10, r0, 0x6) 11:03:04 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xfc, 0x0, 0xfe, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = syz_io_uring_setup(0x46f1, &(0x7f0000000080)={0x0, 0x5c9e, 0x2, 0x3, 0x1bd}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x3000005, r2) close_range(r0, r1, 0x0) 11:03:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:04 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x10001, 0x3) r0 = syz_io_uring_setup(0x454f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000280)=@IORING_OP_TEE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CLOSE={0x13, 0x4}, 0x200) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2}, 0x1000) mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x200000a, 0x110, r0, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x949580746dac22f3, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x5) shmget(0x0, 0x3000, 0x800, &(0x7f0000ff9000/0x3000)=nil) 11:03:04 executing program 2: mlock2(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54bf, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x141003, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x3, 0x1, 0x7f, 0x0, 0x9, 0x1254, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040), 0xc}, 0x2240, 0x1000, 0x401, 0x5, 0x7f, 0x8, 0xf3dd, 0x0, 0xdb, 0x0, 0x4a75}, 0xffffffffffffffff, 0xb, r0, 0x3) 11:03:04 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x20000918) 11:03:04 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x65) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:03:04 executing program 7: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) bind$unix(r0, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e21}, 0x6e) preadv(r0, &(0x7f0000001340)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/145, 0x91}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/83, 0x53}, {&(0x7f0000001280)=""/138, 0x8a}], 0x5, 0x80000001, 0x8) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:03:04 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000040)=0x7, 0x3f, 0x0) mbind(&(0x7f0000fef000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000000)=0x10001000, 0xce5, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:03:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80045430, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:04 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:03:04 executing program 5: unshare(0x2a040600) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) clone3(&(0x7f00000008c0)={0x128064300, 0x0, 0x0, 0x0, {0x40004}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 11:03:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r2 = signalfd4(r1, &(0x7f0000001f00)={[0x9]}, 0x8, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001f80)={'vxcan1\x00', 0x0}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f0000003200)={&(0x7f0000001f40)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000031c0)={&(0x7f0000001fc0)={0x11c8, 0x13, 0x298b94f6ba5beb55, 0x70bd28, 0x25dfdbfd, {0x1e, 0x0, 0x9, 0x6, {0x4e22, 0x4e20, [0x8001, 0x5, 0x0, 0x9], [0x1, 0x0, 0x1, 0x400], r3, [0x0, 0x2]}, 0x1, 0x43}, [@INET_DIAG_REQ_BYTECODE={0xaa, 0x1, "a7d5f1f3f8c867e72758764ed2fa51f70bf07e7ad7c71af654a50da0817b4ba2079c2dfc574d6c15723334aad1937acf267c1882879356e3e73f7cd6c37d062464e5ef5744a3b4b66546af0c43753fb7c1688eca9d402dd99720683c82f1af01ef0b0bbe0c2a2fce0cdf554b490852e3279a7f6b6fdc8c16c95a088a7167b2b11a2405d5c3d9f8bd7caf8836f791f6b9542e9b333491cfe9d1974a8b6422b11ad4e545c13c6c"}, @INET_DIAG_REQ_BYTECODE={0x62, 0x1, "3b31290cdfe456774704f84b5d8c5b4f3f02e52692876769f00432db45cfa3af4854d63a83321679d9a6553740525354196f3521f92ac6191a85c143bc98e503b21a380926c131252099aa42c6d759e91b6b18a1d2606629ad19e0445028"}, @INET_DIAG_REQ_BYTECODE={0x66, 0x1, "ba742850f807c1ff8650b0ef584969a25c6c7d4cb08b453a5259dc05250cf2a47fdad4f524cfe2264c8430ef6fe924ff5a51c3344db291b5959dee4f8ad6565b6d54606f8d7e610e8a623b8bd3bac0ed9d2f67450fa7fe82852fd275ec76e6240878"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x11c8}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 11:03:04 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:03:04 executing program 0: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000003680)=[&(0x7f0000000200)={0x0, 0x0, 0x2, 0x2, 0x0, r0, 0x0}]) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) pwrite64(r2, &(0x7f0000000240)="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", 0x1000, 0xfff) 11:03:04 executing program 3: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000fef000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000100)=0x10001, 0x5, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000006, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xc) mremap(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) r0 = pkey_alloc(0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000000)=0x6, 0x4) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9) pkey_mprotect(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1000001, r0) 11:03:04 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0xc020880) 11:03:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80045432, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:05 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{0x0}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:03:05 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1, r0) 11:03:05 executing program 5: ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}) unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpid() [ 2198.556024] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:03:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80045438, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32=r2, @ANYRESOCT=r1], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) io_uring_enter(r1, 0x5cdc, 0xb7c5, 0x1, &(0x7f0000000080)={[0x6]}, 0x8) 11:03:28 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280), 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:03:28 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x1, 0x5, 0x3) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000040)=0x7, 0x1, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, r0) r1 = pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x2) r2 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, r1) 11:03:28 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x10c0100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:03:28 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000d10000/0x2000)=nil, 0x2000, 0x300000e, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) munlock(&(0x7f0000fec000/0x4000)=nil, 0x4000) 11:03:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x20, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}]}, 0x20}}, 0x0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x204801}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, r2, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy3\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4080}, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r4, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) 11:03:28 executing program 3: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000000)=0x4) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) remap_file_pages(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x8, 0x1, 0x100000) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, r0) 11:03:28 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x1, r0) 11:03:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80045439, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:28 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mmap$usbmon(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000005, 0x30, 0xffffffffffffffff, 0x4007) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x200000d, r0) pkey_mprotect(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1000000, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r4, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000040)={0x2000}) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000000)=0x3, 0x304b, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 11:03:28 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x149856100, 0x0, 0x0, 0x0, {}, 0x0, 0x51, 0x0, 0x0}, 0x58) [ 2222.054821] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:03:52 executing program 5: unshare(0x2a040600) unshare(0x64020a80) unshare(0xa00) clone3(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x20000200) unshare(0x8000000) unshare(0x44000080) unshare(0x80) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRESDEC]) waitid$P_PIDFD(0x3, r0, &(0x7f0000000200), 0x1000000, &(0x7f0000000140)) 11:03:52 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = fork() ptrace(0x10, r1) ptrace$cont(0x7, r1, 0x0, 0x200000000000) ptrace$setsig(0x4203, r1, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x5, 0x81, 0x8, 0x90, 0x0, 0x8, 0x40000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x7}, 0x291, 0xddf, 0x6, 0x2, 0x8, 0x6, 0x0, 0x0, 0x7, 0x0, 0x4}, r1, 0x2, r0, 0xb) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:03:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80045439, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff1000/0x2000)=nil, 0x2000, 0x2, r0) mremap(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x3000, 0xf, &(0x7f0000ffb000/0x3000)=nil) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x2, r1) mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0x9, 0xffff, 0x1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:03:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x4e40, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:03:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80045440, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x3038df6e29cf674c, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@privport}]}}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYRES32=r4], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:03:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x3, &(0x7f0000000000)=0x8, 0x1, 0x0) 11:03:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0xc002, 0x0, 0x1, 0x3) mbind(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000000)=0x2, 0xffffffffffff0000, 0x2) 11:03:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) move_pages(r0, 0x2, &(0x7f0000000040)=[&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fe8000/0x4000)=nil], &(0x7f0000000080)=[0x9, 0x2, 0x101, 0x0, 0x9], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000fea000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xffffffffffffffe1, 0xc) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x90001, 0x0) r2 = accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) r3 = getpid() fcntl$setown(r2, 0x8, r3) mmap$perf(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0x8, 0x102050, r1, 0x8) fallocate(r1, 0x40, 0x4, 0xbdca) 11:03:52 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:03:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:03:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x284e80, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x12) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:03:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80086601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:03:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x7) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:03:52 executing program 3: getpgid(0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0xa5, 0x2, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 2230.869500] cgroup: fork rejected by pids controller in /syz5 [ 2243.958445] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:04:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x80087601, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:04:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="63c279ea46883c90d189011667d3fe7e528b50bc4b1234627322307510caf612beabd59ef87e5248ce87e38aa9076ded50272800b18d47b509dcc43b0e5cec7e590b6fe71cbb968453c5f8196b2d1d21b46e3d8189df9e6ed8570eaf106e21695a7042ea875fe901fa", 0x69, 0x3}, {&(0x7f0000000140)="838aa3e8cd0adc886835f4efd47e83be9d72060000008649a205125d579001554c9be8ffaf6a279c5e2295c4c4a35a1e5c775d979643f1f57ee1af37147d32fe3a11af71ad8049bf52fd56b0658c4aa92b881fd10513e98cc8e795c46e5f4db29476a6507b973d24af4cee508dd66cf181eebdee2955b9f7682015380c1b7f13327c801b5f5db79d0122390752abd6f6a70adb337c51efec25cd98", 0x9b, 0x8}], 0x408, &(0x7f00000002c0)={[{@nonumtail}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@shortname_winnt}], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '\xb3\xde\xb2\xc52s\x80\x8d\x03\xc0s\xd3\xb6\x87t\x1a\xa9\xeeJ:1\xc7TF\xea\xc5\xe1\xa0\x00\x9cS\x1e\xe7\xa7c,\xba\x8f\x14e\xb9\x1f\xd1fX\xaa\xcf\x04Q\xa3I\xee\xf4\x18\x1b4\x06\x80\xef\x1c\x87\x85s\"K\x88>\xa8\xee\xf2\x00c9%i\xb8\xe3h\xf7\xa8\xd5\xd4\x13\x82\x7f\xf7\x0ff\x834\xd4\x0fgs\x11[\xfe\xdf1W\xa7\bK\xf0\"UxE\x93\xe6\x80zpN\x82\xb6\xcf|\x02C=\xef\x1f\x89C'}}]}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(r1, 0x74f9339d4179a4da, r2) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) close(r4) 11:04:14 executing program 5: unshare(0x2a040400) unshare(0x60000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x100) unshare(0xa050000) 11:04:14 executing program 7: syz_open_dev$vcsn(&(0x7f0000000000), 0x1, 0x640000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x7, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:14 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x494902, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:14 executing program 0: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7ff}}, './file0\x00'}) ioctl$CDROM_LOCKDOOR(r0, 0x5329, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x20000000000001, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2040, 0x0) mmap$usbmon(&(0x7f0000ff0000/0xb000)=nil, 0xb000, 0x3000000, 0x8010, r1, 0x80) 11:04:14 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x3) 11:04:14 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:04:14 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r1, 0x2, 0x0, 0xcb25c90, 0x5, 0x1, {0x0, r2}}, 0x3f) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:14 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xd) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:14 executing program 3: ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000300)={'gretap0\x00', 0x0, 0x10, 0x80, 0x6, 0x0, {{0x36, 0x4, 0x1, 0xf, 0xd8, 0x66, 0x0, 0x80, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x3f}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp_prespec={0x44, 0xfe11, 0xf1, 0x3, 0xf, [{@empty, 0x9}, {@multicast2, 0x7}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x8}, {@empty, 0x81}, {@loopback, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x40}, {@multicast1, 0x2}, {@broadcast, 0x3f}]}, @lsrr={0x83, 0xf, 0x9e, [@private=0xa010105, @empty, @rand_addr=0x640100ff]}, @cipso={0x86, 0x55, 0x2, [{0x5, 0x9, "de521692630784"}, {0x2, 0x9, "ff765c242b77f9"}, {0x7, 0xa, "b35e17fed03f42c3"}, {0x7, 0x10, "193ab90e1805c376c1069cfeb5e1"}, {0x2, 0x11, "bca30e6bd0881d9b2de330415acf4f"}, {0x7, 0x3, "16"}, {0x6, 0x6, "430499e5"}, {0x6, 0x9, "db29decc6e2608"}]}, @timestamp={0x44, 0x1c, 0x8, 0x0, 0xa, [0xa2a, 0x31ae, 0x7, 0x2e6, 0x2, 0x7]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022bbd7000fbdbdf250700000008003c00000200000500380001000000b1748631c83c34080034e92b65271199b18be1f95f3400ff0300000a0009000180c2000000000008", @ANYRES32=r0, @ANYBLOB="05003300000000000a000900aaaaaaaaaabb00000800390040000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x9d, 0x2, 0xc0, 0xf1, 0x0, 0x6, 0x4020, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_config_ext={0xa0, 0x3}, 0x2100, 0xbc, 0xdefe9bfa, 0x6, 0xf8b, 0x6, 0x2, 0x0, 0x705426d1, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r2, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x40000000, 0x0) mlock(&(0x7f0000fef000/0x2000)=nil, 0x2000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7427eb6e733d66642c7266646e6f3d", @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) dup2(r2, r3) mprotect(&(0x7f0000ff0000/0x3000)=nil, 0x3000, 0x2000000) 11:04:14 executing program 5: unshare(0xe040700) unshare(0x12000400) clone3(&(0x7f00000008c0)={0x810000, 0x0, 0x0, 0x0, {0xaf}, 0x0, 0x0, 0x0, 0x0}, 0x58) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000040)=""/25, 0x19}, {&(0x7f0000000080)=""/109, 0x6d}], 0x4) unshare(0x200) 11:04:14 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x18}, 0x18) sendmsg$nl_generic(r1, &(0x7f0000000840)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000800)={&(0x7f0000000140)={0x684, 0x40, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@typed={0x8, 0x59, 0x0, 0x0, @uid=0xee01}, @nested={0x3fc, 0x5b, 0x0, 0x1, [@generic="fdb56649032b6b0214c89986870995279ed61009f02a1a3903534a773ac55f32471f8c89606e191e3fbaaf709c4561a2cecaa50facfeb78faf99b99f78d6e9ccd7981e29c3babd45dcaea21728d80922796b70ed619616ec302abb455095f9eec19a33a45ab3af2116828643699401a98c5b9eeb5ae29ccb0d04f3feabddef99b640e0dca4ea5d8a46a6bc0efc", @generic="f874087df390021af6eb166104a0c4b65c7976cbfa2cd57a817a365d1f00c7415fa01411e61d01b57309158ad28a561f3d2706e6183cb36a5b9ef8d97a29667d064a83affc51f954e6e26284de5eddcfa1cb8ff209591627b0fa150269527c386c6b71bbeb1910b1feed169c6d503993062ffa274da4e5d96bcb95c4e1ee18bd0873bec4557ed9bb213968644d", @generic="d4adaa0eeaffd74dc2fae447f86e9eea2cd4dd91158e0d820a12912594fadadd1362f03d7ec9c5991f9f010b72f1eec37a24525a6f3d11eab1efb4428589a7a86e2e861e0670f8724adef2c5af7ddb55d4f024290381846c8e858740d83340d426a673c37b832de20a0f0897b35be4a7341b8fbb1d9e13053b23", @generic="c61e08d2c8314a373ee5a4303f8476bbf5c39cec69c143c45ff30fd537c493ad6f0172b860e2032812cf7ed5af2e308d9d903ab3ce37ed29cf0106af18fdc3e4dc4e3514bc07e37410f43bcb82", @generic="9e5af346c6b5c0e3dc0e5e744066482623b8e7fd0ad71d003863f233a0c5c468bfc136c78b362d10baef3f2555e9d14660dcabbc87c1a08fdaf6a5321811b81a67595c58333d937d93cfeb0cdcf6cfbcb5c07e93f5c66c5040ec85916695696ec878f1525db5fa1f4f1d6e1259cac17a9d7fec79e06d5686db3f26b24b763b4c1bb1457f7e37774821a9fcc694552c8b0faf227560", @typed={0xc, 0x5a, 0x0, 0x0, @u64=0xcc06}, @typed={0x4, 0x69}, @generic="dd3a96bb57e9977443b692e14d2a15ceeb85d40cb4e484371f0e1cf6748009915c7b2d28af198ece574c3de5c4dedc83c9aed90e7d36477b94aadcd7875947ac6b26fabb396946a91d3afa73762aea27e1e30c3c5a55b76cbd92b0edb95690d9ab9d8648ed641887111cbe3b01edd7fb492a984ebedefe5dce714f6ac3254bdd1e2f63fbaddee3f64036bef1892fdc87949cf016f736fa28e82546ec93ba7fe621de5f2239ee2dea04b0b18561f1ea72a70303", @generic="7f204d84039f0429893aa81eabaf935a885f37a5c2d5609760601bafc382309685f2298d21761f6e6cf6aadb4e9a2af9dbf652f28e13a59eaad6b7638b1d6017ea718e0935e887cc327c7dcf21735c60a3e092adb59087c495de6720", @generic="0057c6fb61bd03dac074f3c1b13452e709b8755c49119e7ae00e8f189c536168834034411ac8c013a7e8ec8b606135f3256a620b4fc77aea8c946a1b4f74c1da413c0fdb687239581b5a2aac579e0100f741202d00570fe0c82cc89d3e4bf64a601c79"]}, @generic="c3872a7ab835def892cd95bb9b1e6bcad463dbe1133f49e2f3a0fe23aacee5c5fa5e8f31318f71ea7cc1dda90923faf12fc04c6a0482da20eb37c222b0e9e954248b386c6bc27bdd240a577b94bd8e434ede237a640b8b3f171021d7349dcb05c97971d3ca2adb8deeb930bc0ab4450b7b48ec7a98035ba88dd0bcbf42ceff2a", @nested={0x1e9, 0x7d, 0x0, 0x1, [@generic="f5df8c463e49", @generic="d9844ee93390cfad77e055a36cdbd1a87fd6fd72a9deacd6870949ed3d44010a7f19efe1e12d3e3e064c863b228d3877220ceb60dcfcd3f023ac9b0dcefe5eaf64bca75ec5a25fd940", @generic="0bcbaa72b67fc66e49c0636de946af806353e6852f612e49f7cb8fea598943cb66fb10d82e74c6a7fa08aee8038c350488366c2674267771932278b2774089d59d4ca8908c10dbf99621f9cfecdb429c6e8ce429573a538e96c27a8bcada5ed3b3f2e7f2a8fd53805eb2d6c0506db5d1bb2aa07a3bf27ba7e558e2d9206d0d867611ea6f355747dfc8becca88d5d1562eac161d6b5d7df77a99d6ec5f19d264c9cd2f2889392806e44a4bfea9dd7156fdb79", @generic="b8cb2a282dae8f2f88aaf2eddc197ba8102910be9427300d939019259d71579ba9641ee9c84d18cc31e49788673edd01d10b7ef486cbe815beaf125982a522e9b016204964c9066da07bbd802b5e018ff7695def4c67f4b8a89265d26ecc0238b1e183712381d861abf8e4d24b5d9efb8baa", @generic="ab9e7a7225972dcf7e500d6f8e8f680daf97d58fec97397c5bd6887f763fec7dae0c1d928ffe97778ee4a068794d32ef3c54fa9933e19d6e832649853baa9d778aa7536819a9c9fe52046c12129751693399477ae76e079a233248d1ae16c55022b73cfc4f21c5bff4dd0f347af2aead83c7"]}]}, 0x684}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x1a, 0x8, 0x15, 0x12, 0x6, 0x2, 0x1, 0x160}) 11:04:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x802c542a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:04:14 executing program 1: syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000180)={0x24, &(0x7f0000000040)={0x0, 0x10, 0x76, {0x76, 0x23, "2c0a481ea7af4c8a5c1ec76228ddb8260b537cb110ed0e10bbe4d17a6beae1689669eba31e5c128d8e26d1824faeb4fd6be4b746f77fc5c086b3435efa002c95f98461024e5dfeb88c7bf5a8437c73ad53e6e690374d44bc44d837a2ae628dc49b2e6e64459935cd298b8f0d0d8e778a998ef9d2"}}, &(0x7f00000000c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x2824}}, &(0x7f0000000100)={0x0, 0x22, 0x3, {[@main=@item_012={0x2, 0x0, 0xb, "19e3"}]}}, &(0x7f0000000140)={0x0, 0x21, 0x9, {0x9, 0x21, 0x144, 0x7f, 0x1, {0x22, 0x5a2}}}}, &(0x7f0000000340)={0x2c, &(0x7f00000001c0)={0x40, 0x16, 0x62, "06ac2cba2706b013a27ca6a8d4ba037c1f5f638b89ce3b4651a1af8a7a5fe7b155dd843c3bb61c5bac2500251171e1d14686eec0e5ab3ce80da41482ec49a08a989daad45078021fb25c20a8c075225a2bc2c8456afe3799b44ce79ddecf6527431f"}, &(0x7f0000000240)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000280)={0x0, 0x8, 0x1}, &(0x7f00000002c0)={0x20, 0x1, 0x29, "b062bedd70e173600dddd97b79bcfb1fbe96c5636c0c6e28acaf5a3ef5a153400aaf606341b5589ce2"}, &(0x7f0000000300)={0x20, 0x3, 0x1, 0xd3}}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:14 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000ff1000/0x3000)=nil, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0xc) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:14 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, r0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x2, &(0x7f0000ffe000/0x1000)=nil) 11:04:14 executing program 7: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x20, 0xb, 0x2, 0x43ec9df4, "c524d2642914d20c891fc29cd156bb4128193ffc6fb7b1d25ab4cd5f4d58715f"}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x40848, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0xc0045878, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:04:14 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000, 0x7, &(0x7f0000fef000/0x3000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:14 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000000)=0xff91, 0x2, 0x2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) madvise(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0xf) 11:04:14 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x8) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 11:04:14 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000940)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001940)={{r0, 0x4, 0x4797, 0x9, 0x7f, 0xfff, 0x101, 0x2, 0x80, 0xffffffeb, 0x40, 0x8, 0x81, 0xac5b, 0xffffffffffffff00}}) [ 2266.065103] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:04:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x288937b6718d40fa}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa0, 0x9, 0x6, 0x301, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5}, @IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x9}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x7}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x7fffffff}, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}}, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x7}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8001}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x5b}, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}]}, 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x4004) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:37 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x45}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x2a5f}}, './file0\x00'}) sendfile(r2, r1, &(0x7f00000000c0)=0x4, 0x22) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:37 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/devres', 0x0, 0x40) waitid$P_PIDFD(0x3, r0, &(0x7f0000000040), 0x8, 0x0) r1 = fork() ptrace(0x10, r1) ptrace$cont(0x7, r1, 0x0, 0x200000000000) ptrace$setsig(0x4203, r1, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) waitid(0x2, r1, &(0x7f00000000c0), 0x9, &(0x7f0000000140)) 11:04:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0xc0045878, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:04:37 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xfffffffffffffe59, 0x8, 0xfe, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) madvise(&(0x7f0000feb000/0x4000)=nil, 0x4000, 0xf) mmap$IORING_OFF_SQ_RING(&(0x7f0000fee000/0x1000)=nil, 0x1000, 0x2000000, 0x40b0012, r0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x38, 0x0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}]}, 0x38}, 0x1, 0x0, 0x0, 0x28004001}, 0x4004881) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = fork() ptrace(0x10, r2) ptrace$cont(0x7, r2, 0x0, 0x200000000000) ptrace$setsig(0x4203, r2, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x4, 0x3f, 0x0, 0xff, 0x0, 0x1, 0x180, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa5b, 0x4, @perf_config_ext={0xfffffffffffffffd, 0x3}, 0x10180, 0x4, 0x7, 0x8, 0xf8d, 0xfffffffd, 0x1ff, 0x0, 0x9, 0x0, 0xb65}, r2, 0x0, r4, 0xa) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000f, 0xffffffffffffffff) 11:04:37 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x5) 11:04:37 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x1) 11:04:37 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r1) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:04:37 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:04:37 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendfile(r1, r3, &(0x7f0000000040)=0x3, 0x800) mbind(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x9, 0x6, 0x0) 11:04:37 executing program 3: mlock2(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x4, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x41}}, 0x7}, 0x1c) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:37 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000040)={r2, 0x100, 0x2}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2288.394419] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:04:58 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x2, 0x3, 0x5, 0x0, 0x0, {0x7, 0x0, 0x1}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0xa02}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x9, 0x2}}]}, 0x2c}}, 0x2000) 11:04:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) 11:04:58 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r0, &(0x7f0000000140)="ee", 0x1, 0x800000}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000000000}, 0x0, 0x2, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) sendfile(r3, r2, 0x0, 0x7ffffff9) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) openat(r5, &(0x7f0000000000)='./file1\x00', 0x208000, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400c091}, 0x44001) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:58 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="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"]) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000fed000/0x3000)=nil) mbind(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000000)=0x2, 0x1, 0x3) 11:04:58 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7e22, 0x2000000000000000}, 0x9184}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = inotify_init() fallocate(r0, 0x1f, 0xffffffffffffff18, 0x2) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:04:58 executing program 5: unshare(0x2a040600) unshare(0x34000000) unshare(0x44000000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:04:58 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ff9000/0x5000)=nil, 0x5000, 0x1000001, r1) pkey_mprotect(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0xc, r0) 11:04:58 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4000, 0x6, &(0x7f0000ff9000/0x4000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) mremap(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 11:04:58 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x3000002, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:04:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = dup2(r0, r0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x1ffc) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:59 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x10d480, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) listen(r2, 0x4) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:04:59 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0, 0x3) 11:04:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 2309.895811] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:05:20 executing program 5: unshare(0x2a040600) unshare(0x4000200) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:05:20 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x0, 0x0, 0x3) 11:05:20 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xfd, 0x0, 0x0, 0x9, 0x0, 0x5e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x40, 0xb, 0x0, 0x0, 0x0, 0x16, 0x8020, 0x0, 0x1, 0x0, 0x4316886f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000, 0x4, &(0x7f0000ff3000/0x1000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:05:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x1000008, 0xffffffffffffffff) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x12) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000005) 11:05:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:05:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$KDFONTOP_COPY(r2, 0x4b72, &(0x7f00000004c0)={0x3, 0x1, 0x20, 0x20, 0x11, &(0x7f00000000c0)}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/udc', 0x440, 0x40) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r3, 0x40046210, &(0x7f0000000080)=0x1) ioctl$TIOCGPTPEER(r3, 0x5441, 0x3) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000500)={0xbca, 0x7, 0x10001}) 11:05:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="4e5c51bdfb0a9f1dd66515898911c06ed7ecdce6a13c09b23f094b0dd2717487fd148d6a415ab3b7fde5d08661edba8a85e048ad05fb8a3b5c4b4d0c849a22f1", @ANYRESOCT=r2, @ANYRESOCT=r0, @ANYBLOB="2af61cda86c965dcad25f71689f6d60be4b4b976d3dd02a82d78525d8ce295217530ddf65fdd1c067cb86dfb6482a6d1933415ed10d059441e895d0eb13580ff58a37ec672a4261c6cc3e13d97da58fbaaa78eac13596c92092346b8dcc925ce12202347aeaf11a85dc98358737a9b9434ee2facdaa20b0815fec79dd19163f6dd4d7585b035ed7a755b2993191d7aefccd619508d540a9f9e150a8f2555c05b5295faafc89efb402919b76abdc5ed728a3748000d85659bcab81edba7cbcb964f5ee2", @ANYRESOCT=r2, @ANYRES32=r0], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r5}, './file1\x00'}) r7 = openat$cgroup_ro(r6, &(0x7f0000000200)='blkio.bfq.io_service_time\x00', 0x0, 0x0) ioctl$GIO_FONT(r7, 0x4b60, &(0x7f0000000240)=""/111) 11:05:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x3000002, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:05:20 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x20, 0x0, 0x0, 0x0, 0x3, 0x7fffffff, 0xfffc, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ftruncate(r0, 0x7ff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:05:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x100000d, 0x10010, r0, 0x10000000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:05:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = dup2(r0, r0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x1ffc) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:05:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x1e, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:05:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = syz_io_uring_setup(0x454f, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000280)=@IORING_OP_TEE, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2}, 0x1000) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$SG_IO(r6, 0x2285, &(0x7f00000004c0)={0x53, 0xfffffffffffffffb, 0x3c, 0x5, @scatter={0x1, 0x0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/104, 0x68}]}, &(0x7f0000000380)="1311e06a3a9de45cf2848f641d6108476b468d15fdc68207e6be5e92abe5ffd00995eaea938958117091f99fbee53dc083c3bdb389d9582190c94048", &(0x7f00000003c0)=""/166, 0x6, 0x1, 0x3, &(0x7f0000000480)}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) syz_io_uring_submit(r3, 0x0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd, 0x0, 0x0, 0x2b3, 0x0, 0x0, {0x0, 0x0, r5}}, 0x200) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) r8 = syz_open_dev$hiddev(&(0x7f0000000240), 0x20, 0x600000) mmap$usbmon(&(0x7f0000ff3000/0x3000)=nil, 0x3000, 0x4, 0x10, r4, 0x7ff) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r8, 0x942e, 0x0) [ 2332.847345] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:05:43 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendfile(r1, r3, &(0x7f0000000040)=0x3, 0x800) mbind(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x9, 0x6, 0x0) 11:05:43 executing program 7: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0xa0400, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x5, @empty, 0x15f}, 0x1c) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000640)}, 0x0, 0x0, 0x2, 0x4, 0x0, 0x9, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)="b9d509650f6d962f6f1cc562726b4d5314eadbab84bb76368f7ed4fb06ce6e67944ee60d7f9a64df3a3f0713641df540c0011950ce13e04359c15013f8d02eac70ee820a615d9a99180e6e7a8c0454aec026", 0x52, r1}, 0x68) mmap$perf(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0xffffffff) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000180)={0x17}) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xd, r2) pkey_mprotect(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 11:05:43 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x11) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:05:43 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x3c3fa58a025449a5, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616efd7923669df747f46e003d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x90edd80a81ebe6ad, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c64666c74757f253d", @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x1) fallocate(r1, 0x18, 0x0, 0x4) socket$netlink(0x10, 0x3, 0x15) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="30cc05edfd5aaef02add80627f630601000000010017c05b49ec7c", @ANYRES32=r0, @ANYBLOB="01000100000000002e2f66696c653000"]) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000240)={0x6, 0x10, '\x00', 0x1, &(0x7f0000000200)=[0x0, 0x0]}) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) shutdown(r7, 0x0) 11:05:43 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x40000) 11:05:43 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x5, 0x4) 11:05:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:05:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x1e00, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:05:44 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13002, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:05:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x4000, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:05:44 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@hash}, {@dont_hash}, {@uid_gt={'uid>', r2}}, {@obj_role={'obj_role', 0x3d, 'rfdno'}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x30, 0x61, 0x36, 0x6, 0x58, 0x30, 0x37], 0x2d, [0x61, 0x62, 0x33, 0x65], 0x2d, [0x39, 0x38, 0x33, 0x35], 0x2d, [0x30, 0x61, 0x35, 0x5c], 0x2d, [0x36, 0x39, 0x62, 0x30, 0x61, 0x63, 0x31, 0x63]}}}, {@obj_role={'obj_role', 0x3d, 'trans=fd,'}}]}}) mmap$usbmon(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x6, 0x20010, r0, 0x5) 11:05:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x5, &(0x7f0000fef000/0x3000)=nil, 0x3) 11:05:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) dup3(r2, r4, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:05:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYRESOCT=r1], 0xffffffa1) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e24, 0x4, @remote, 0x3}, 0x1c) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2357.759340] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:06:08 executing program 1: r0 = fork() ptrace(0x10, r0) ptrace$cont(0x7, r0, 0x0, 0x200000000000) ptrace$setsig(0x4203, r0, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) wait4(r0, &(0x7f0000000040), 0x80000000, &(0x7f0000000080)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0xa) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 11:06:08 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ff5000/0x2000)=nil, 0x2000) 11:06:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x448c0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x202000, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000200)) r4 = signalfd4(r0, &(0x7f0000000040)={[0xffffffffffff325f]}, 0x8, 0x80800) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:06:08 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ff2000/0x4000)=nil, 0x4000) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x5, 0xffffffffffffffff) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000080)=0x4, 0x1, 0x1) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x10010, 0xffffffffffffffff, 0xc7034000) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, r0) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000000)=0x7ffb, 0x21aa, 0x5) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000003, 0x1010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd_index, 0x0, 0x0, 0x0, {0x183}}, 0xffff) 11:06:08 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, 0xffffffffffffffff) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:06:08 executing program 5: unshare(0x2a040600) unshare(0x24000000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x54060000) 11:06:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x100000, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:08 executing program 7: mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x1) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x2000000, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 11:06:09 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ff1000/0x3000)=nil) 11:06:09 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:06:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) 11:06:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x1000000, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:09 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:06:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x882, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="11f9"]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$AUTOFS_IOC_PROTOSUBVER(r4, 0x80049367, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x8, 0x7f, 0x968, 0x3}) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:06:09 executing program 5: unshare(0x2a040600) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fork() ptrace(0x10, r1) ptrace$cont(0x7, r1, 0x0, 0x200000000000) ptrace$setsig(0x4203, r1, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6b5}}, './file0\x00'}) clone3(&(0x7f00000001c0)={0x10410d000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x16}, &(0x7f00000000c0), 0x0, &(0x7f0000000100), &(0x7f0000000140)=[0x0, r0, r0, r0, r1, r0], 0x6, {r2}}, 0x58) 11:06:09 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mmap$perf(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x2, 0x1010, 0xffffffffffffffff, 0x2) 11:06:09 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:06:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x10000000, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:06:09 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) 11:06:09 executing program 0: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8000, &(0x7f0000000000)=0x6, 0x8, 0x2) pkey_mprotect(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x3000007, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r2, 0x5) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff}) mlock(&(0x7f0000ff0000/0x2000)=nil, 0x2000) 11:06:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x200040, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x81) r2 = socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB='Z\x00']) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) close_range(r3, r5, 0x2) flistxattr(r3, &(0x7f0000000040)=""/73, 0x49) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r2, 0x40189429, &(0x7f0000000100)={0x1, 0x3, 0x8}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x20001, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r0, &(0x7f0000000280)) 11:06:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x1e000000, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000100)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x121000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x100000, 0x0) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2382.570528] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:06:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x0, 0xee00}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@fowner_lt={'fowner<', r3}}, {@obj_role={'obj_role', 0x3d, '%^]\'&'}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000140)=0x4) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x12) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x210000, 0x0, 0x7}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r7, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6}, './file1\x00'}) ioctl$VT_WAITACTIVE(r6, 0x5607) socket$netlink(0x10, 0x3, 0x15) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x1}, 0x8) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KDSKBMETA(r8, 0x4b63, &(0x7f0000000300)=0x4) ioctl$SNAPSHOT_SET_SWAP_AREA(r6, 0x400c330d, &(0x7f0000000080)={0x1f, 0x3}) 11:06:32 executing program 5: unshare(0x6a040500) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="2c0026f5591449bb376617e8fc6f1fac5d1b72e58a4ecf33d721e2388df8a62645ebae588e8115a7526765250c6249867ebf4d917e46c00bbba7e5a1a2c30f8d82f51c708ef7c5d53ca4b336063f4b1d905d08739b606e020b7365b335a307611422793a3382c7473241cfeaf8861a34dd907dc934b6e7eb3c604b5a978806b0a4d645e59a467ac89c2f0850471492dc9e030c7c00000000000000"]) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) 11:06:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000500)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000a80), 0x6a101, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) dup3(r5, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) splice(r2, &(0x7f0000000a00)=0x100, r3, &(0x7f0000000a40)=0x7, 0x2, 0x7) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r8, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000540), 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r8}}, {@aname={'aname', 0x3d, '+'}}]}}) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000440)={0x3, 0x1, 0x1, 0x14, 0x14a, &(0x7f0000000040)}) r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$KDFONTOP_GET(r9, 0x4b72, &(0x7f00000009c0)={0x1, 0x40, 0x1d, 0x9, 0x159, &(0x7f00000005c0)}) 11:06:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:32 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x28}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x8, 0x2, 0xa, @mcast2, @local, 0x40, 0x10, 0x1, 0x5}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000100)={0x550, r3, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_MASK={0x9e, 0x5, "c0f3380be8524ab4642308b195296dc48d4df32c923a0fe2dc3dc33154a82fc9eecaf3386c621df3536ec1ee76d9bd5da184b466f0729127b83533a99343153619c53ae40d193ebcaeee3be0f68039a0af78c7148f9b27f6a272b9c4c8e2e3955c5a5bab33b287d3d5f7f16b6c949792020cf212499f080eb4eb8ed8fec961b7bfce82b6f01f50a32f6dfd0afbb395d66b56a8bc34128b53b0d4"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffff}]}, @ETHTOOL_A_WOL_SOPASS={0x7c, 0x3, "2cd264518b3955ce2a359035b6ca44224a1b1108a5224cba026c27ef0ba7311cbbc403e5a50831f47fcebf296da4672d518c6a0ed53e3587926359fb21b0a87f9437f148328166a6ce8e08070ae47618f75855af5443e2fc2095c903a98c8aace6a1db5902da2d00291db7f3906d3fd1359188feba1b066a"}, @ETHTOOL_A_WOL_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x9d7c4ad646dec1ec}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_WOL_HEADER={0xb4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @ETHTOOL_A_WOL_MODES={0x258, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "a54dc8017459e5da18b95745516511934f47871bf43fb9d1e3165e3188100a8526035c269dc03a4bdeb21da4ec5848bdf265cae1ef02999818ba"}, @ETHTOOL_A_BITSET_MASK={0x86, 0x5, "e1b4d22f4b3b235d72f1c17cec5a82374a116cf8a41852a0e6088f878710e659512a183e270eb180d0736ec3fdc65c1db7127ad1dbbb73f6379bf91d3151c1ce8da2c09a666c7ce81ad1bab537cf8189c714c5e49e7054d89e2a5bc3117760ef3464d962c28ac8c8bea55f0969b19334149dd7c9f83a418105020aa580614641ab4e"}, @ETHTOOL_A_BITSET_BITS={0x184, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ')%t{(]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ':\\@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '+--+&}{\\$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '+}%,-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '.+#%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ',$].\\.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40004000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\v+(:@@},\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\'@$(\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']\\(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xe4\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x20}]}, @ETHTOOL_A_WOL_SOPASS={0x68, 0x3, "e22cc360c28ccccd005e84e701cddbc76d66a34b3e1401827da34dd50982e117b3a79fec60ddfbbff03fa8756a77ed34923884dc9e58f4b8e33812e160d18bf61827cce96ac780313936686a36dab10eed154305cf6ad04d9d35d6b57c4052739397f881"}]}, 0x550}, 0x1, 0x0, 0x0, 0x800}, 0x4000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:06:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x40000000, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:32 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r2 = dup2(0xffffffffffffffff, r0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000fee000/0x1000)=nil, 0x1000, 0x4000, &(0x7f0000000000)=0xffff, 0x8000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x2000000, 0xffffffffffffffff) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$FICLONE(r3, 0x40049409, r4) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r6 = pkey_alloc(0x0, 0x0) accept$packet(r2, 0x0, &(0x7f0000000080)) setsockopt$sock_int(r5, 0x1, 0x1e, &(0x7f0000000200)=0x7, 0x4) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r6) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r6) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x9, r6) 11:06:32 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_alloc(0x0, 0x82bf1186b4ba34a0) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x100000a, r2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) 11:06:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:33 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 2404.988108] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:06:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:56 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) 11:06:56 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mlock2(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x1) madvise(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x14) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ff8000/0x3000)=nil) 11:06:56 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x2000, 0x2, &(0x7f0000ffb000/0x2000)=nil) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:06:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) write(r0, &(0x7f0000000040)="d42000ee31aade8a58b2d4641dc1f00b7e607c965dee47170ad57957aab9b81aedbb11d836229050fad9f4a64d665936caf72fb0052b21b68e24abcf8ee2d992bc3f706b49f802de61b68e47c0e3bf8905a49cf300", 0x55) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:06:56 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) 11:06:56 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0xc6, 0x8c02) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x7, 0x101, 0x3e, 0x6, 0xb, "a53af2dba21f29f06d7c68480f3a316fd862d8"}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:06:56 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xb) 11:06:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="e63a4b999a0fcc80aa6cf4feb8e07a0379a10e2d273c741516755fd8064f623fe4fcf11a652d4e77e42cff4047c0271056021bef74a1bfba8fe60b83eae6138da15ef49718bd0a951fbe108d66ccb26e8064d9053af1363125a834cc229419196ff12c94723cdd6bc94c548659868d1e16dad16786e6ef33148a88be91148c5e"], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000040)=0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) mknodat$null(r3, &(0x7f0000000280)='./file1\x00', 0x1, 0x103) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4}, './file1\x00'}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x200800, 0x0) ioctl$TIOCVHANGUP(r6, 0x5437, 0x0) 11:06:56 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 11:06:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0xfffffdfd, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:56 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000fed000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/4096, 0x1000, 0x1, &(0x7f0000001000)=""/144, 0x90}, &(0x7f0000001100)=0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0xda09870c536331e8) pkey_mprotect(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:06:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:06:56 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000000)=0x3, 0x8000, 0x7) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xf, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:06:56 executing program 5: unshare(0x2a040600) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc0, 0x5, 0xa6, 0x0, 0x2, 0x3e, 0x8000, 0x108, 0x40, 0x3d, 0x42c, 0x6, 0x38, 0x1, 0x25, 0x2}, [{0x6474e551, 0x0, 0x5, 0xffff, 0xe9d, 0x2, 0x2, 0xfffffffffffffffc}], "c2c42268d462f4ef0fbbe8e2bb0c61f36d3d0fb0b0c5ce6227a733999b50e05435fb9e89920a0391ee5f8fe0863d413cb50155334ac4a88ce0d1a716315f59d37926df167d21bc919712398d7a0bf61eb6ff6cb5cfdbf5b34218406da683a6b67b9064f88b1442f907c02308d11ac50501ffe6557cb5627ca0af3203a249081c98e2fe7991c221916a16606b289d9fb3bbcebb420c2b3b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x80f) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x5a) 11:06:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000040)) [ 2427.770514] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:07:18 executing program 5: unshare(0x2a040600) clone3(&(0x7f0000000000)={0x105068b00, 0x0, 0x0, 0x0, {0x22}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x4000000) unshare(0x40000) 11:07:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000040)) 11:07:18 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x1000, &(0x7f0000ff8000/0x2000)=nil, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x400) dup3(r0, r1, 0x0) mbind(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x6, 0x8, 0x2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:18 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 11:07:18 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) setregid(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r3 = syz_mount_image$tmpfs(&(0x7f0000005040), &(0x7f0000005080)='./file0\x00', 0x9, 0x3, &(0x7f00000052c0)=[{&(0x7f00000050c0)="e8a80e942af407b06ec09c93a28516b831d2e9a1d3e00707f4d8223c7117ea4b910a598e78ff0742da994969646122a21edb1312eff74d243646adee10c3560b5ee4663e1f24d0846f295e643cc7713e2ea382907c962bf81d089c1c3b1490afcf7cc380d304ef4a0922b7232fc0", 0x6e, 0x20}, {&(0x7f0000005140)="5b805f7980710c0d8f88a49c3b813c594bd48dd408e73b5cb5dd8253c12fc42d468e75ca09caf5e34ee87a11d1f79c937b55eb3df46ec1eb104750d53f94928a874522011369922b1d28dc48cd8c7573de38b078a074c1dc24aefa67e19d349061e07716c9eafb8680e89848acfd6bd624d4fecb0f3103049842fbc571a2cbab2039fe5da89a37e05ad1fe3b7a0c71631f0f569f963c912cbd4e2ef93812574733956698366580df6eb7", 0xaa, 0x2a}, {&(0x7f0000005200)="fb163222111e0ed4a04c337a0911d1225a6b3bd337c9800405b1c81aa234f110914ff89fa44abf36d22e3957c2baae0d02ee5cc02363ff426d21af5a5c35565a145fb6515d348e961dce2d2940ee70719e799bdae2fbb13dd54fdfca6d814db62ca59eadf7b6f71eeaa66fafd63c18365898e0e63b51abc60f287e64bc4303990ff5a6ad15c004d9a3b4340f0b952b31b477b661b841", 0x96, 0x1ff}], 0x38468, &(0x7f0000005340)={[{@huge_never}, {@huge_within_size}, {@size={'size', 0x3d, [0x78, 0x36, 0x2d]}}], [{@measure}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005380)={0xffffffffffffffff}) r5 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r8 = perf_event_open$cgroup(&(0x7f00000053c0)={0x3, 0x80, 0xff, 0x7, 0x7f, 0x3, 0x0, 0xd87, 0x4, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x0, 0x5}, 0x1a081, 0x8, 0x5, 0x0, 0x7, 0xfff, 0x2, 0x0, 0x5, 0x0, 0x10001}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r11}, 0x2c, {'wfdno', 0x3d, r12}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r13}, 0x2c, {'wfdno', 0x3d, r14}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004fc0)=[{&(0x7f0000000200)={0x19b0, 0x39, 0x20, 0x70bd2d, 0x25dfdbfb, "", [@generic="a413", @generic="faf4e48ac6e7cec6985906038a1fd3010bc597794157bef106f1def3caca6e17e320fffad4ec07b5db0c7642009cb11fe30550591704f171ac6d76d7a8e8f8fcfaa16024a66d370fce06085951e8345e9661630dfba0f19ce11676d51213d013788f5e6eed4880013c5001c837f18261c993c33016882cc8d2674e23bd9551f763aaaaee3200f3ba174469373cf8735cb789964b83e59e91dd48c928fc3ed2a8904d2cf67f01c8e7411c24afad2f41ba2ca881ef2b94859ec15117019f2c5aad57d143971966a9204a6ce043de823db591ff42f55b127e07b6ef85246addb5450af5d3cb10865b024d00ea5c29821356b9115da43f34e1", @nested={0x20c, 0x49, 0x0, 0x1, [@typed={0x8, 0x4e, 0x0, 0x0, @ipv4=@empty}, @typed={0x8, 0x94, 0x0, 0x0, @u32=0x29}, @generic="661adf6d2339217ee6704f80bb5ee47fe6b58a33b520d085d1ae160f", @typed={0xcf, 0x7a, 0x0, 0x0, @binary="9ef537fdfed165aed42cfd1fde98e3fea4199b1773c4950059ed3b6eb83cd4310633c7ca75503959ddc9099b0090f2b6ee05413370c6f9b00896668e888e7e70a059a658b43414dc806b5e278a9dd96fe428752acd27a7d2246c11a137627c976faf14c6d3da06f65893033a8477a9dd16f6442ec83baded2f19acf097b1c4e160d2c29f4bbc121c34551454c7d45789a77c46d1a93b7b1ae060574035cbb2586a4242be08298acd355945ef579a0dbdeb287a2c3e6e66c572924d8829eabf7d2ec067d2a5bedffe0d2fe6"}, @typed={0x8, 0x57, 0x0, 0x0, @uid}, @typed={0x8, 0x42, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0x14, 0x55, 0x0, 0x0, @ipv6=@mcast2}, @typed={0xe8, 0x8, 0x0, 0x0, @binary="e3f1cc27f203695ecacd6ab2f51d774eb4d45bf90005317e2ceff739b9a8691b04c7f4ad2a9afb64dfbea4e14da9b2c79661277a6cdee1a68362110614cf8cddfcd47c660088ae4446a6f4f77b3327788f0783037305455d1c880b902b3da8ed1ac76c0b9299f364f15e1833953090739f6f90e240b3c7c84c0d29a52aed6e7aa76e2bb8beffb506577c61948a3ae177748e3d17e0d7804f98f7fc208b873025c89fdeea921b4e190e86d3699750ee1b96072dbef60918165403cd81b8e9a75d0c58ba86b756de9a12f0aceba5b317eb164e52763d54bd644b530082527fb6711561c350"}]}, @generic="b537439259256841d6390bff1ab6681e6dd6c227404a831c04431ed53c3568141248cdbd933bf20659e5bcee0bef304eb6a6abbfd13b75d96e296b9faad668883a64c7ff84aeaa375d501c34658f52f85cf1d59eeb34ebb2ff99ad4479990e04e5343ab229d29c44996bade960420b6b40c928d27d42f1bbafd977644f50d6067b7702cae4d0080c228baa53f79f", @nested={0x1190, 0x25, 0x0, 0x1, [@generic="68a6b3825a5e024bfb13cd53425bd824ea80f28c62b1e2b39ce1a0df4f435418be480cc3f3668e267e5ca2196f09c52b3005ca0232d3fedb", @typed={0x8, 0x37, 0x0, 0x0, @u32=0x9d1}, @generic="67428f367d94e02f31cc77a693ac080716cf8e95be8a7c0a83a76ea7b3a8e56d624852de62e5fd1cfcb524a6ad912b96b639c081880ddd4dd4cf56265cca9db08aa97674083b21a6596aa2d14cba1092b9b6ba6eeac355ed52290526c74f2511319ff838a042a24aaa95aeb4273e032889a9494eb0c2ea2593b79ad76db02ca2d888596d930da7c9182b7e50c49faef8367a53123729e28e7dfc2d7643f7ed2d05675b89097f6f967cc9bf91fb", @typed={0x8, 0x69, 0x0, 0x0, @fd}, @generic="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", @generic="a1cd3e2169246b37fd80079399d8cdcf4173964c7c175a9969dde66f7c3866f336799f04e4a79919401bd7b0a434264fbd8ace7893eef883ad829d2a28bd71dcd93a94e2448dc42e098478bba18fc53a557cbfec9c8f9e0ee96249b142e9be4036af9436534be82ff63c5472cec63fea6e2015e5f617be0e4ab372e15bba5c536043a66333fead", @typed={0x8, 0x59, 0x0, 0x0, @u32=0xec}, @typed={0x8, 0x35, 0x0, 0x0, @fd=r0}]}, @generic, @nested={0x290, 0xc, 0x0, 0x1, [@typed={0xe, 0x2f, 0x0, 0x0, @str='/dev/ptmx\x00'}, @generic="92b12c7ba24930702b3e9ae8d62248e9056048410b8c5b584877333e4f1a53d125d79b8b4300f9327237485c74c481ef9f18c5145555927fb4a6b7b2d98465f555c47516c735c92b6eac2d94a426a9f01790d41fd96a5b72f2c5c74dfcf76a8efcbf31a2199c7b3b66375043a963182903f5744e428176beb68fc7cd4eb2efa200a4068777067c5515334e38868e84c431097ed823d1c2f4f121879c869c74f4f04966ffaf581a877ceca9e8ba876e96a5aa3b67bdb8207c82bbb030948f13638896b6f62a03db1ff7", @typed={0x8, 0x7e, 0x0, 0x0, @fd}, @typed={0x8, 0x6, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x5, 0x15, 0x0, 0x0, @str='\x00'}, @typed={0x8, 0x72, 0x0, 0x0, @pid}, @generic="ca9aef6618b398e3ef621874f215bf5bf80dbcd9903288df7c503e8327366a4cb9b0205880b13bfbc5998d7944a8c569cb46a93240fd0d0100309137308e094aec62038d2402ba3e9ef3f3c083be00327cf59f0058f210420c1d03f1d7c148ef9b7202765ce50f9c57bffe886642e806d50d8a41183ed0daf03f4f91ba1010e485fa53fa4421ddc064a4939eca04bd8ed26862cedfa7ec5d3bd6009056deedda666fabaf7e6b681b", @generic="5281d0a02952e8485138a0578b738807b5c257bfef6afb7ceab2e86275ec103d7abcc6dfc2cd579d81951892c039258f75828f64638cdceed9710a223f3eb52bc9fb83661096e8e67fe7f6bbc39f0366d45b41f1ead3", @typed={0x8, 0x4b, 0x0, 0x0, @ipv4=@remote}, @generic="f323c47429307d0a768df51034120926aa26d1ddd3adbe75a58660d670128f9da216407b0e600b3a1663aac4d9fbcc46d3e6033ec2e15203321f76dd391ef7afca2501f5fa3420f92333a056b1400ec8c892b65a9dfc28e5c9d514a74e71cd5411bf01994dea20957ebb72ebef16abc2320fc9f0f784becc50a7d021a2e491cbdf4396507b09934a3d04dfa33a"]}, @nested={0x1ea, 0x2b, 0x0, 0x1, [@typed={0x14, 0x32, 0x0, 0x0, @ipv6=@empty}, @generic="65d060ffc6743bea8a483a33c93906e2e7a3881aaf84dabdbeb48a24def36652ecb0c8e0783de5755fc61516d1f217917de08c946948e5937c1e7e941effb9dee065e0a5d7b8f2feb02ff65e905abe6b84d0990aa8b2122c5077665f2b9833078858a0ccb9e9c62f41a04586c6f8e8264c99d985670b02e586f571d368b82eab063462713843268697002e7abb595e9ec1c4a09fd6507ca060eaf9c2ac8e49ac2f1fa8d40e5dc77ebee5e45d4c95ec39f2fb4fbefce758fa1b96d7ed3bac0d00406060fe9225d5c2fafc5ee6779ada2780dcb636bfdd02301ccbf127", @typed={0x8, 0x5c, 0x0, 0x0, @ipv4=@multicast1}, @generic="6ffd53cdfb0411202f4caa7cffaeccbaf3599066f3ff6e196e61080ab23feff34f1873f3d1c56ba56e89088c79ba65387a835af316f2cc29826da9c9fc9a7e182eb87cbd6b107a823042461c8d62bc02eb166149f57f5846fc4018c751fb981038ea7081897e0ab7c8ed28f193553ca27f66461c162b743a95879265fa8ec664769da654f9e74a25f76a3b7fdfc201d96b153c7a788bb025b573417d0d08c53427ff32b4b11216cb4b58b72a1c425aa032e190b4a090ac989176d390ded1886b5666ddfdd4e49935cd6101818cf2e8156268c322e14a270e58e4a70d29d8ee449663e1326dd6b173ef9c353c153e"]}]}, 0x19b0}, {&(0x7f0000001bc0)={0x14, 0x31, 0x100, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x4, 0x37}]}, 0x14}, {&(0x7f0000001c80)={0x6d4, 0x1b, 0x200, 0x4, 0x25dfdbfb, "", [@nested={0x28f, 0x39, 0x0, 0x1, [@generic="ba4e4ded5f4c1587ab79f5809d0f4a262c5450e4a63a3912a17a4818c9737bb7d8aa0d491aed8bb2fbc5794de659df097d3c29137cdb906f6cb96d2903b9b38ee91a615023ae18ea426904f941aab02b9e3550b0dea5d718ab5e2ccef85817448efd59d4f92b865a5226b8109516f3bca2044ab5da4c39b9318c9ffc39702ab741448800e15637e897ee99e5862d8465efb62831c32d386edc5b50ea6f7a23ac7664e68c941f49c1ac4e918c39a23922ac", @generic="d3166d8319c2802cbe498cf9afd3f93324f168a258d274f4449365bf47627c3103d6bc5655a4555a796aa1734e15500e58c93139048fe723a6dbfa4c730c9835c209aa7451aebfbeaf4274eb412e33ec34215cdaffeb44b2b3de459a99d83e2eec343a8485ff47f184ae2f7a73d6d14f9373f42d6b31e03b17378cea18e1b5c0890ae1dbcb6eb84b1252ff4e9386c9a2cee1130af2c6ac841bd0e236fc93e35deaa2c747a3be276f09bb2de16ee452dd139aa8c22e0ca8224d519e", @typed={0x4, 0x79}, @typed={0x8, 0x15, 0x0, 0x0, @u32=0x1}, @typed={0x8, 0x4a, 0x0, 0x0, @ipv4=@multicast1}, @generic="3507f3c506a48418d6c8761fa0d820b7e1f4945a5371c0de02429f506e857b635ddffe2eb69f65a97720", @generic="1d708264d805ad5dbf0836d048d8ddc9322149e30924ecec1ebe19c637a5a078f958f52379e6470dc79ce5c155fa574fe9e9a848ae74cc671495deab44a9091bf767d4f23a5b13cda0054700b8709e18494e4d1d3006e53c49eea686b5423a005d72871305a9de3cd7078f985bd6651872ad8ba9c20c16e4f5c0629d1f08c7d4507f4f9d1f0d81cb0a52c6c870bcb0829d84498143aa002a73c1993fc47f54e25935bec9f8184dad493c76257195c90877be92f1e0995c443884bd118f9c6ea94bf8d2df72b99c865b728ea0ac6fda3c94d9a024cd32a793fd188a37843e7dfcf1"]}, @generic="ddb202b0e6ce208e642fd67a8cdb201bb4a69779ef9759930c1089c619382b37e8e72c05a5b190e6232362f982462e3c95f5ada21c56765d43b8e9497aa6365c5bc8790f0436b1c84def5d3f82b7983008ba152e72fbf8347afb1cac641cc4e15081d7160a6a8d3503caca6108172cc4b52672793c454bd55d60accb7e2007c23c92ee4301ff1fe3ae4f73c2956bcedb184066eeb23f37d0b28b7f45c16ccbb68b35a47f204d627db2167fb23bd240695bcbf596797b4f024b1b75c3786e77e485af73088ac473aece55", @typed={0x14, 0x90, 0x0, 0x0, @ipv6=@mcast2}, @nested={0x1fc, 0x4c, 0x0, 0x1, [@typed={0x14, 0x55, 0x0, 0x0, @ipv6=@private1}, @typed={0x8, 0x4a, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @generic="a2e9d69c265c6d5cdaf86940bb7f37274eb5dc7fa3254f1bf1095fd4bbcd5f3ba562f70c7c11eee9ea1c33f135e927cada13e31f516d6b3d00dfe14fd87a5551a16da73e331711eba1c9991870124b66b9f65f798b624b7a81b52a4f36c6d66f53734d2f390dc48983be5d42c2152314087ea98fd4a30df3e0fbabb57aa6a098dd0745963b7cb2dca2b5262844ac9787ba9c34c8f3353833cb21134fc4ca567d741aeb72ed97e50d096013f64ee919674c996893f37e53b32e7355f9bdcd", @generic="41dd430cb83ba8e481a81379", @generic="9460ac02365f91cf71f772445c11ebb6ec3b8c70e1822e1fd7f940ea8ecf6dffef9583aa00a810996eb0d0fb05799523c59429a0fc153c5c9fc982e31c68fd2836607cc87cbfb8b2955fb67bcf58ede1734788bcf15dc1d676639700812aa79bcf7f021bdaafb981e703a66a75746723bb8c34be33fe3848ef0390c71ef908b98078e8331a5332c591394389afcaa5577742bc78b1b79a3362adbad000c7acf992b66ccf76674a5a7e31607999387266cdf2c824350aff68bc5a0aafeb2c6fed873b", @generic="d4acbb97b8e398243ce01183d74898e4b71688b4a2371eba510059473f7bf38a1a5b9b347cd94f3b99bf77c8f864e7b3fb4090461db757f8ddb1adc4800372afdb9354e94b705a52b159544d14a5", @generic="161c"]}, @generic="8e9dcd6beec84221ec8aebcd8fb965ddd2b81b6558fb18778d9549e1b95ac078286378f59b37fc6822b6751ae73420c58ab14a8ed4cf42663bf0c23c9cc09eb0f3aa1e4509fe6a452a694f9882abbcfe7db8d5f83c012a49a9a9b8a443a1abb6dfc58e929031ade154c554aeae63fc3eb8aaa357140e9087b00cbefb79ff08e7f1f40d54c1609d00d38b3dc281759d5f02525b89c2e8e164513576b1229663c0024d7ab0111992a14700489daae32a417e115b2e7a7adf5fc04e8530d054", @nested={0x9b, 0x33, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x30, 0x0, 0x0, @fd}, @generic="451e5283f84c7a6c2bbc099fda7728bfed34a55539a8ef381007371d2d60bdc2881e12f6910b2ed335ace73481f8d18967dfe6abb5ea80986501628f82117b29fd6d4d58a23ca93be3175989a0481a40d9a55ab7328d47e93ef48fd692caccf967ee0b1f1f90ce4939466b75764857f6c8643b9610b2bd5fd649efd5c203a0", @typed={0x8, 0x31, 0x0, 0x0, @ipv4=@remote}]}]}, 0x6d4}, {&(0x7f0000002380)={0x23ac, 0x41, 0x2, 0x70bd26, 0x25dfdbfd, "", [@typed={0x98, 0x5a, 0x0, 0x0, @binary="44f8b0f235928954093964e41c4ba92210bb0b58d5d6c57cb9bd96bd438a29ab7c95a1be5e6d86fdc9fbd264149b1d4fededa898f0e7fbbbea381ac150b930ea8474361f8d5c42834232ac68f6bbc36371c44dff7862f60d16b66bac47bbfc71d9c1f6d354d96cb1b4a9c8e883828cfa52a87880121617d533b764ff0d44ef3ac15ec613b76027344bd574f70c6c2350cef249e8"}, @generic="54bab437d12df813e360c142a4529bf6ee2ef669a0b30e760bb29056abb17ce0ee62f70939fc82083515f94ba1e7a945947af8e7c826e271807f011efdd0ca0e60d0e641449fdd7bbfc64eeb8f72516ae01d266d903ee5b13c600894de9e569e52f21b7f1ee34d01c8c2671044d46e9d24f8035f21a057c66e4d5138e4e5decc2246496d8120d333516e19d8243f2dcbd7285e8b8a71482679ccffdc7ee22c4375b1c4d4e9", @nested={0x2158, 0x57, 0x0, 0x1, [@typed={0x8, 0x35, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x61, 0x8a, 0x0, 0x0, @binary="2729ec7f9eeff66d36dd8762acf3f46cca6821bbcbe9b74a3bb89609c75c7f694a2a07570f5008a742262d52269a23fcf364deed29b2d41f3b620e4f92d0ec67346b349cccf2ce26dff3daccd38a0c1fae7749a8d49edd670671d8d13c"}, @generic="a80deb1d352db520300401079f612a87925f2f15135de92bb66482fba9ff8b4a286d4b090bca589e287dc4d9072890ea2a83f8270664611f15777c095a6f82e9bd762e213b55c58a59c4491fb83074806a7e50e258daa8107519c90f934c0bb6448369b9e130a7b93defcb5d38fd96feee9c0feff349c28e4aadf055fffadb08268ed844c3e926716c3a3e61a4cead5dc8f83d99aa54179667796818ad39a3ba497c9502f960bcabd80089368823a3e3a9155b338096e1591d046a5161f3c8321d8e30fd52688aa584b25f4d666406154071d0a1c2d72daaa2894527803f76a6119992a890e29fd4d29c91494e5e4281eb0878398a2350cc9cc2a7dee58c602bf270bd2260f300c4804abce9df8ceea8750d0df9622567777ff718b868c795765d07563b8236aeb81eff4d72488b185ff07d28ff40dcf751b10cde851cab7a2be018b2ee91a7186f96212a0c5f0621ffcaacd8262a745248928fda436b5a181dc5fef848ca21008a82f698cb2d901dd6c4a4534ffb25d08535fcb61a48c870e869ceb9365c8387a83f860df8e9dd9832a67881f4c3e1cd747234fda671e9a21bfaedf140f8ccf56e5dd5c7b950921f81866bc3df707a8190de2a6ea30ead62d0af803ebabe0a08298096d0692ee0d5f476933ff4d13c0b0a64c70667e0e868a4504d86c1231345f62184a5f476304f8e57f74749432a009405334eee70784ac120dafee66f67aab3788fb713a94dae1cf7db28075d18890a8bddc92534099445b8c615b43b8853ba9d191b15abcca5839f0fdb7677e444fd4aefebb5a6b3bfb52be24c4edf34b7c3253b18fe3494f422007ef619f5027feaab6de9a024d5c4ca0db6c90e53e095824c93967aa495e2aa7df5130ba5b34db6ef05f141cbb9db454310ae5e1a53c3f803f9d6bd43d8b29a6b61f5c09bbda29c20bb8f68686cc756a8d499bc49886b2739bc54b5d7e5690c9a4acf4a1aa1dc6b8827e55a065b486304ef25a4101834bf7faa87a6a1a5ab516dbf703103819952d671ebd06409e8fb824ed702def8ad7745a328aa358e45309d8ee631163baaad6f899c532e19eb980bedfa41aaffd5d8948f6ad712135bf4d77b0e7e7d50c1c7b7e3e118077180cbaa27d97a6fe8be0dbdeb2a308a3a1ed4b78867d88c6933f543e2409b552173b61c31b86b5916b9179adb383913e935aabda31cd6712f005386cc1afe8a95c0e793bda1560df6c6ff346857c82c127e39d71baf2b34ba571479654bff413a0b3fb1d3309542546c6bb63c7739cde418ccc36b10ef3b11a57405e17ff368bd0492b31e508667b32d38bd4ac8ef6f8a6b920281fac4319bd0feb613ffbf10ef032e0b92939a6b1b2c5f6121f312eb23310d08583f20c9e09d69bc36c5cf6f118d141f27f5ccb48b29d8d9e469d5adfc3c8e7404429ae4ac6c1fab42499a93d8aa3f1e8ecedffd0ba907833742ede54d9a7204cecd6bbb2b8fb4020332788474e40a751636cc89857a425e884c10f9dd66f65eea1cabb77bf322d4c3520b18f3df6f223d4a8bebd25f5479e9d7b6cca4b0cbae637bfc9659aabe4be9caa8b15eab5585bc898c3e1ce279e33de0c34c39b1b7c3bbc5fe6e960151dcfe8d8bd1c1583600edd0ebb48775f42e947af7cbe7bdab4f8d4aa87a8651b65aa1f21eed8c9a43ae0fbaef23f2d5cab01edfb3875ddf0411a9384588e79ed9a6a7ebecc533547948cc904ea5c71e1d914c8ea355f29a80231e9e394eb8d21b645263beccc669751eb7b759748dd9a06292f308a821acf97514e7908a57284a94684dd2417553e4630ec08c234fd4a5db00f82180fde5448aedd9e980da77322e689149482eb19f612972dd84f0ea0f5e89aad31d2fc652c9e5473a4e22d751b44959b119e1d9e94436ecfba364f238c5fd6e88995d247cfd096e60c6967fcfdd163c05d0b73dbcb8a9a425fb6c313f4eb5c0dcbc0d5283d1933a07dd00e49a5cc456e835cc045cde9c3635e72ca4be3c072f18c6f0950fbf67c55c54e77cb8d76e30cf183f9ed9dd08f8a3be349eec9193da0507233658e7cbe62c1e24455b97ca1c6a48484573c2b200453c4ee7d241fd7017ff436c2c94f7f7c508fcdb9882dd4bcfdd61314c5454b4e08dba248858dc8c30a3e4922ce02ea6f26b1902df82e1865cc5acb46017c59b4f44b88fe6955c58bc5cad0755665dd3f227f34d8ab9dbc00810842cf0d71d884405ac39d853217b7c6c7a3cbaf7a1493cbe2159a645235919e5ab43e579bfb2fcc578fbb0351d1f06ae556f4ded86d0d0a70f849e7a0e980260449d420bcce86c6b709d0206200322526a29428a861560508b203442802d4551a118c799085fc48c57434223a9d54fc59bc26346fb47edb0db4e79818f12470ca55fb84d09f2b12eb33bf6a1ae25fc74c90a4d3d59048ffd68f2e9d55c3b8c64b379bb1471572448019d2898788d68a3faff082e87b16edc3da0c3d1cf8942d9587a6c1964e2ab4c7ef1092dfdd417b79a0d81d99ffc2f67df707e294afa79bc3d28413b9b1dcae440e4b2fd62950ebaa5b1c509500b2336e391358d80491defb0264f21f7ab78b94611dfd7487e15faab054f0f7657d6fdd7c89e2bb6e04743d5ef5a71affbbdca97c2bc39392c013a92a4b9fa61503c53edc28f1983f0607c013ad35cae12f3207cb5609e733018ff45892830e4b66846e2a2cc6b97694c50040a8b6bfd6499503b9a7fbeec544b7417f3e2ace042aee664a8f78c7c5aef309e84069932f6ea51a2131476f017aca530215cc1bc69b947ae82190dddb4f5b4b285c3f6e27efffb2fa8419e9638f899b6364a4e4f7834252c9cfaedee60c334a856dea564bc999b80fbddcb00e850326e6739d4dfc03693c936c9785dcced565574ea89d243bb6305cb02110450029cf3950f0c21c73cee2a9b7c7c19cdde56ff187478099547721db6d333fe9849615cddba4619bcb47595de93bc23175c762bf759a4c357e490215f207bb7e6842cd502d08918a166d7cc77459dbf96f1aeeef2bc7f95b095f5e2d357ec72404c0d8357a1302fa03ae76e066f3b5e7b409d2b356146b829bb1580bbf6eee614d6c78dbe012cb53a22bbaae1dfa317053af6b8fc6ca15fdc0726e215de15ab830845a0ec718d6a039efad6418e230ff277f043722d28aa28d52ae5b1883911000660ddf410490c43cf8b1b63eac2ccdb8999b17ecf53ae13048b686fbfa4c23d255ef70c9cdaec526d74eafa7d6cdd48f4f59227b442c791efeacec0d8779e5a41b661a2b2448e61402456eea15e4d91b4b515aeaa816446103d8c5334f40a8271d8560847fb2a78718513e187a2bd4071a1dbc9f61e29c50932679f0b90903bcef783add1f9a1f3bfc401a0896b7630a2c254173d6ba6e286a6bc7e74a733ce519760b4fb0c8bb9e778871861d7368f2ffd34d37898dca85980f94ddeb7ba7475eca27b44d89d8f2692dd1ee6accf2e57abb6e830b0277304ba7e661a19cf1940cc9b72f6cef29b2ff5e8722f62050bff0a7f73481f9f5e231ab036df015327f2bd7a6ba311df136eb8ccb21c20a35d500b6a68600eaea6930a259b21d7161850a18c932baf955cfa69345ffb3cfeb16ec3e3fda6cfd0d7a40f87fe706d8489ee2417eee870ac80d89e6de8cdb62c940ef33c249994c28d5d6fcc978d3797462b6bec60fdf9f9986b3dd986412354cdb7192e34adabb8c313f280f1ac888a0d73e009149dd6df6058d2693018695d7e92246c6e36a43c5c57c48f04b28ebb78cd955864245f32e2d0b04238fb8e74112551b0d42c05a2d22b052e5a4c60707ff18cdaee1a9255911def5f8d0901cf17eaa1e4fc20082f811f48f2fd999d92535a2dad867148528e4ad131c304daafc1c72ebe57f18c7e879112c9405ea1a25219836121a478c0d94691211f713e7d93c51ef2dbb25b3a9a28ee73c2a002357924dec96c951548d0613eeb053e39dd500e099df9358a8c9d83dc7e1375a6bf07f60faf558a10d26fd27a5116218060fb7a31974417939981abbe4ff621deb632f5ebe84c6ea5d7921879d3b7595a1321dfdceabbb4ac0cfe24d3ac992a03607a2cae26cb0e9afe2537fdecfe5e8ad07e030507be576567cf4b279242a8b6c49e34f3c61eb2c4067d80adb331620020702ee34402e588a643205c03762c0510e5e97b59f7d0567e13573fe7b5fd09a0e121cc55d10d43585ec4848e6b1d9a3c9e0e6e4eb6f5c1fcee4621e87c690fce3516ae45ebf1182ad8340650a66b37a8005928e3ba637c4566ff182b2b189430d2504e56dab981211a5a3fdfffd72cb2f280679937b34fea612d050d5a6f70308c25dbc6f91dbd884d8bdfa4061e0e521d1da97c94c72726bc926c4ead757ab2bf127683f8752a6ef68a82b0301874a752b9f49d3a56f6a6073a77706b16c53b073e6054485b1c4b6b9c3e14f58e707264c26c70156b490906675933a7d529b5cf3d0fabcc9bdf72a235bffb5d6be214bfa31af4f02f04e6406db80f60f8d44bd29271175fb2755263ed4d454069fa464bdc1a4442fbde211180f9e3449981d3c8ff18b007a389199106d830943e881714c22ae1f3a8eda4b1312eb5a6d57b18cec27adc855a321e53b3d6259a0b25889bcb6e13694b24fbfb89763f4b34df49cd5109fd0fc0054f716c2e72778b8814225e2b3d706c0e133e09bacce801a6439d946463ba40e3d10aa91f03a6f702c38bbad3623842704bd31ebca3a9e0cecf1a4cdc006d2046afb7cf5bacad4f18cdcc42739727713504b488aba2226f95086d70abd04f969191cef6ad3a116e4c3f60e508ccea5ea4ecada98843522e6cc1806d6066a6a0f8e68ce3e66ca84e9431acdfed6536dc6e4f451c86d61cddcbde8ef13a5f0b83c88691ffbdae313eaf0740be7bbe85058a076bdcc0049f9b7d1b2528c6d6f8ee08dd45e52d920d48fafb007626e4bfa2a1af518ff2d68f1e0e071a19c9e839590fbdefd8c4705d5d991a4dc288998f4a61af9f016607889a2b96b77f1071f8f1f1681b578ced6c5145c53249ab01cd663e19a7b053e470812c6a35eeb4fd4bb3c56dd8c39825ea823d44520be31a597c3cd1172c919c6cb6c637da3affbf54506c487fd96f630ee089cf28432f9664ea66adaecffa86c44280ea1d1a984d51a9924f5ef467ab794e228888d40ae3839f81f2bed30308a9819fd8643cac01eaa7e6f1788d4e8e62608189de2aeaf42ecec6b478f83294e2230054432362e6da604b64d9c8cdb7ee91851e97838e74b50229d0c0096f28c5f77ab645a013c319a251f5a3aaf1b5930f0de1dd9299db4141f70f459e19d56836feca391022f27f9f1543e4108b50427132cdaa340dba183d3f502ba7e8246931a86badbed9e84b059dc59cec46a77082e17672d1c3526dd71203e8153ad186ed240dc54bf9b3a45780d01f80e1e722f898402c60cfa8a53857769e07783ffa659b0c06cde868758b9a8f85ed522ca8923e6103484d680a794c67d1f618ba97ee29562032403f576a3ad719dd4272124d56a248495708ba60bdd15918c050ac2092bf1cec38c42367708c9cded7aaffab452a93389ee4445af3b9103530f76e30309bd6ba2b5715747d7e84d4a5dfe3fbf0cc96b6bb8a58106400ed856aef278399f28e4353de0b4794f8c76e4381971136da9b4d6dfd22bd8ffe9f2bed44e4ffd18e4f3df83f7c392884f32b0bc123fd68aba9277558cfedee5a606be7a72d0e50c1bee594193de0c3d04fe8561a621838e92a287c5feed50c09a25df0e542ed9d079f38a8bb4175", @typed={0x8, 0x32, 0x0, 0x0, @uid}, @generic="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", @generic="04f84a41ee87307941b9955f8e7901aed0d5106221ae08c59955b75907ba77f6fec222b3110a04c311021a88c608d0401c98dda6f145fced1961569190271f2b749a4f1bb3bb581883509bc11bf1ce4781d6fb68afd43789373cbcd4bf344b0eca42ac16bd5f3ed9c0ce7d3c3eb6f331eabe36959595b5b1a9f33dcdfb7755fa22a2a54c6f1a48eae091dc17d95869adb566d5254cd2f6a6c7127972bff9ef549cb3d46a844842ed3d95a8cfd7fa0bb2e7f8117ec455a1c82cb53829c8479f260ee6a95d6ab282a1a29325df9b9adf23bd5a0756f373048a", @typed={0x8, 0x60, 0x0, 0x0, @fd}]}, @generic="0498aeeccb5b00ff6f9a1b3d68033da91692d15bb9da6de1816f6b66de5207f750b2829bde939f721f1f4f4044193f3ee9d22d2b44b1365780bd036d05a53695be3c698badea721fe20df0f8e1263429cae0a5a26d7faf84a1d3af81a95018d9a3fcd5d4ec6952cc92b719488999bdffc0be4ca8da8ae3e4cd9a0beb11491b600d1ae9aef3f2136b488dba2891ed6cfc8c2eeebaa775854366c2c0e4fd42a1ae8341de70f000795c24f950", @generic="09612e52b7029c7a31ff41d1a6d25396f8b3134fb8cb456a2ff82757089f90ca8ed0b714e495c059b9a100747726788dcbf0d04b61612c74d7ce3b4ae88e12ebd75edc0d1d0fc2c21610c43e67ad", @typed={0xc, 0x14, 0x0, 0x0, @u64=0xf2}]}, 0x23ac}, {&(0x7f0000004740)={0x2b8, 0x35, 0x200, 0x70bd2d, 0x25dfdbfc, "", [@nested={0x2a0, 0x3b, 0x0, 0x1, [@typed={0xe, 0x60, 0x0, 0x0, @str='/dev/ptmx\x00'}, @generic="e4d013a96b6e1173608566e0274192168f8d4af57fe3916f23e53d37829e856d424ff8c02727c350917975c7d6b0f7d36e6933231ba05a47c2a7f74009c71d7aa35f7c8e8c937447ef826fd8e25797e393f7a727fa59021ca1f0f337f9ba8f42fd9d6ea5584edaf216b2a638ea988539f3439cd7747af0ea8704f41dc5200806a4e3ce87250c0de77176e2b5f5653a3d1c9e081639997d0a612abbf85d7d6bde0202d006b7756e96fae7203f95957a4f0b8a2e19f4a89a2c90", @generic="6ba50779a5ada44a67272bbaae35ddd7eb4b0459490ec4b34deba32aecb7a50280dbeb90bf89c1e505a507303729686317da9b1a6bdbbfa4bb0e0507f1c5d397cb0aaf07e914b50b837b902042db5181c2562f297620d8be5b26c7891e651e14cdf39c9315fe286532e7e6ce1839780f933b79f34ec4be63260679ca48e12cf763b54396458e89836360ba9a86ac79256c4e7954d1", @generic="fb9138abdcadbfd86490410a037605981fdb8037456bd199d9663a3fc79e701e27019ef2ccb9ae7c0cd701d70585fab620fe13aee948c240c5a0abebea717dda73375629477e90cc64e9574da8642bc33fca86e907ed59aab205f3f02268c591ebb4b810457e28feb08595f3ab30837fd64ef7a48ebf11d898071f3878e77f4a", @generic="236dc18496a330b534527066cd52deb532fba4cb8a984035a532bffd380c7e32d3200875c9c5444e72e9a626a833cef9dd66cdd2f0a78ecdc518ad531db81df8a8ec9e6689a5c619fb81172ef56d621fb2e6b9a55f0791d7e3380944a78040f0c91f41cd5c992fc9875e95a78b802829d602e79d32fc6bcd3bd6a889c8262e2821516dfe89822d085d25e5cd89ee0d059931428ee719f7a6d0974d6b847bb04ba31c83a353375fd47c8ec05e9845ea522f6c4181852c04aa6f4139a91656"]}, @typed={0x8, 0x24, 0x0, 0x0, @u32=0x6}]}, 0x2b8}, {&(0x7f0000004a00)={0x458, 0x1e, 0x100, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x3fb, 0x92, 0x0, 0x1, [@generic="f9c6387ea882dcd7f8a00ec31c476fa5572aa12f9a50777afbdd6dd2d25b879f66d0e9175cb79c2907031f37a703c6b5ae7a142dba40480a5f3f935afc17c01b50cdfa8a9c87633d96ae077273bdf7ba45e3d7a6ddc97551d5a91f630946ca7ce0118d0c6a8bbc253bf322966df9ef494c887127f387a5e536354a35631e3a639a85301a9bd57f683dab73b74f8cb40d44b74f6bfca3eec1dfb1577f7efda328afb69623fe4f575bdab68bbccfc0b39e6b627f63dc9492378fb15322414d24859ebfb49a119839e43b709af0fdcabd0d761114cc82ce06f51a8138ec7368e7fc9ca6935bf36b8fbb046506d0614ae9ab019d792c93ab94", @generic="81108ffeaf351e7eb773877167c3ea970dc40e31fe28f50c7421c76bc2a177a38bf8359a21e2dcad53e9ae2b1ddc63532a1637fd1ec669edb9f005b5614e2ffbf341a06c94b16a668a5aabe33ef890f4333f8a8097966a47718949ad5ffb45b5e77f5af308137403064568625f18828ade71d370131d5a964388b036165466709854556a32fbc77f5b912f69516a2985a733dc8ac76d32946397e86ec626", @generic="8c64a3aa6c2a3c5f3b09622d9387f9add996acf3118bcf697cdda3ae5eedb19ac3c6136734df5b2b9ea5aaf12c675839b2b8e8d8a4aec795b782aecb355009ab71988793e43b9f3266398057882323df5dd141f1d509a13fc49d8153a9b2ab369d1ecdce645c4c4095b037fecb5e8d1b0f", @generic="f51f71ae24b509f794c794074ffeb74855a33be2c9035038cb8491f3d65f35a48fca5bf3ffa0059f41d8303e6f67c3233c08501594eb2a08c59178ec81d2ae8a747611344d4562f6d52e4f7d6a879278905ca2c61a0b2584589b537903c6c9985f3d1633a196e0dc5bf5f05db0cc5b0f7aed43aea03f4d5f1e5886a840581b20e075dcad15d27874b0aabcdfa44b9ca6183b2c1eff1e", @typed={0x61, 0x3c, 0x0, 0x0, @binary="ef4f02e33c047eb4023da65cb71f6129d42318dcd3089ac9ea520f4707bdb55cb3bc50831f264a8f2761b18e9cd0f34c732adee2318d011608e0c4c0fbfe4c95d79b8a0a2e0a2841373a7aa25d5b7569a18ca0c43e14f4dd2e603d6705"}, @generic="af1d2a436f8d7db1b05c5cf57434b4d40bbfbceeee32046284051abbc4be67b80864970946534cbc7e663f473140355eb6e66b30c1a3a6de01a0b9516e25d9817da93f7f28c16412887b8082e3a9f32e85bcbead25e06c3c148b9c86bb6e9dd1c48e86cec6fbfc274cae9de8ab740c9100e1ccb3bc40ae1f0794aeeb217868a734b356a19b8f194bc748adedcc8a47003658f9117005a5ddfb6a24e2331060adb668ac7e46f212bc7dd7d8516fd2f356474c9e6496378d1b183027337e836b67a18c091eee305aeb649d72f0b0243317e2b38877b5b8ad09e46a2798", @generic="8d75ca9f54270d", @typed={0xc, 0x8f, 0x0, 0x0, @u64=0x9}, @typed={0x8, 0x36, 0x0, 0x0, @pid}]}, @nested={0x4a, 0x5e, 0x0, 0x1, [@typed={0x8, 0x26, 0x0, 0x0, @u32}, @generic="3bb0d41d8dad9f005e991f42e4ef9269762b1a4fa7301c3be175235468bfd9734edc7c1f6e88b5cb711a172de13e4b874e7f22596a1678021aa1523bc5b5"]}]}, 0x458}, {&(0x7f0000004e80)={0x100, 0x1b, 0x100, 0x70bd27, 0x25dfdbfe, "", [@generic="8f6e58d2272ac97d3b20dd5f672d0705cd9af73761439b7c4e7cbbefe69f55224883fd9d7390b227c8c28e31d6e2458bbf43a170b1ace926f7dd2c7bbf8c27eacce48b36ad6cc71907e0d9693c46b6022bbcb992d12600e02db42bfd2760758cae2f07cdb09bab268d94164cb1fc0a90379a80fc9909c1f737ca92463af96f8d9e739a3323aa0d4dc8253cabada5da2702bfe37578c29b1912a1a05743d1877553345b90a8c400df7b188f85900402fcabd26a22853b8b69c8296a2626cce4188976c511d2a9dba6b3374846ed3ab1b6e1daf1dac27da72137417050cbc839ffdb7f4ede4b2cd725610e29b4e8"]}, 0x100}, {&(0x7f0000004f80)={0x1c, 0x20, 0x4, 0x70bd28, 0x25dfdbfe, "", [@nested={0xc, 0x56, 0x0, 0x1, [@typed={0x8, 0x82, 0x0, 0x0, @u32=0x7}]}]}, 0x1c}], 0x8, &(0x7f0000005440)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r2, r3, r4, r0, r5]}}, @rights={{0x34, 0x1, 0x1, [r6, r8, r9, r0, r11, r0, 0xffffffffffffffff, r13, r0]}}], 0xe8, 0x8810}, 0x4000000) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:07:18 executing program 0: r0 = msgget$private(0x0, 0x3a0) msgsnd(r0, &(0x7f0000000040)={0x1, "d1bfb1c48fe6df33772822901214c5d90747f526d7788f7285a49a0256312ab699d294d71ab4d8d9bc50c83a26020a45cc4b8939e15aaa46399c685178f97fbe25dea71b28d3b55d8b1b8fe2c7e8bb"}, 0x57, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000000c0)=""/4096) msgctl$IPC_STAT(r0, 0x2, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r1 = pkey_alloc(0x0, 0x2) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, r1) pkey_alloc(0x0, 0x2) r3 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r3) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000001, r2) 11:07:18 executing program 3: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000000)=0x12, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x65) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:18 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x0, 0x100}) r1 = syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x4000) ioctl$CDROM_CHANGER_NSLOTS(0xffffffffffffffff, 0x5328) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000240)={'wg2\x00'}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10010, r1, 0x96c02000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x430, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0xe11, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000001d0e210c0000000000185c71877c8a1008009d43b5c57f716513e7ddd6832157257170cfdd85d720244157e5548f334cb4a5e1834c38c1cb6265c78cf08e44d8fd5a6ca268bc3c5576f5a6863bc9572a8bc8d4feb34f319ef7a1a255364cfbbb0dcbf88ae89448593e76"], 0x1c}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000000c0)={0x0, @aes256, 0x0, @desc3}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:18 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x4, &(0x7f0000ff6000/0x4000)=nil) 11:07:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x10, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:18 executing program 7: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:18 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:18 executing program 5: shmctl$SHM_STAT_ANY(0xffffffffffffffff, 0xf, &(0x7f0000000040)=""/204) unshare(0x2a040600) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x40) unshare(0x40) clone3(&(0x7f00000008c0)={0x18041000, 0x0, 0x0, 0x0, {0x1}, 0x0, 0x0, 0x0, 0x0, 0xffffff42, {r0}}, 0x58) 11:07:18 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 2450.992116] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:07:42 executing program 5: r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xadab, 0x5, &(0x7f0000000440)=[{&(0x7f0000000080)="1b2ab494b3528f2df2201b71e6fc6bff57bd698a600177ccf1f7cefbc29e1b64a5cffe0c11de32f095d4e19e522c1ec594e0375cd090e04611e834c8944de0ffb87adf50081281a0b3f508faf62a13134e9ce000debb73f4862d9641c7159b5d92c352d8062340a2b08ff14d709ac3f576e80cc1c36e4210acf38054b2a3f476c472f2d1967b48b3daa563cd7d1c39ce7937ea245fa6cf22f363b3a1f6c5", 0x9e, 0xff}, {&(0x7f0000000140)="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", 0xfe, 0x3}, {&(0x7f0000000240)="a80afed8c16fc289e79d859c8ba6676e1d898afeeb32ea03cbfd9e94e0347fd9e05f91da2fe640f0b537eff40f7b89f0b6b4c6cfd098f58a9e655aa1f63880515b4559915840206e9f55f92cf9c250b810554661bc8485a2abb92d73752273279c73159ff23759708b0fb74dc2a6adafd7831c2b196ff36f1d682cc9690c803c94e7fcffac669fefbd305770a7fa94eaf0fcac07ec66a4e915b428d756e9f857f49a0a2f3a7a10b5686b4d", 0xab, 0x988c}, {&(0x7f0000000300)="310857bf4f3f59bbeb6d4ef57171fc8e7f8b18da657a2ec9717cd01c618929d0cf3871935c54610b842389c89443bb46ecfa41f1b448", 0x36, 0x3}, {&(0x7f0000000340)="9781925f35aeae2f440acc7e818689cb53db364cbe7029285a50880665c14467919b1347c8ad2740362c7df3d808e07f01e6f7f3ae710d0d4b886188327cd5d5564d21b8d76bfeeaca997349070cf0823f06bbbc54316e874e04a9d97616090d5cd1722c21af9ddd739b486a46d660f9d2581695f760cd5b4f9ba56e7cedf29d417df78b10cd562e1a299cb49164c07fa4f3614cd28ea2d27d075e2579f34aac444cca20f84d8102c6620480690c30c0130be0aba3d81c056034256d51f2664ebb3375e334a275a4c5bc4c43be51f820acfb232cbec36a718503949d62554a47c6456f5b858bc984340e6fa089d752363fc0bbf16d", 0xf5, 0x3}], 0x2014020, &(0x7f00000004c0)={[{}], [{@appraise}, {@subj_role={'subj_role', 0x3d, '('}}, {@subj_role={'subj_role', 0x3d, ')\xa1\'\\'}}, {@context={'context', 0x3d, 'staff_u'}}]}) flistxattr(r0, &(0x7f0000000500)=""/98, 0x62) unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x42100, 0x0, 0x0, 0x0, {0xffffffff}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x48010000) 11:07:42 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x8, 0x1, 0x6) 11:07:42 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xedb6fba66df93608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffefff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x1e, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:42 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r3 = syz_open_dev$mouse(&(0x7f0000000100), 0x401, 0x40000) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000340)=0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="037fe3c85a9135dd46da24f0ba79ac6ad197fb7786f89bb05ce96bc3e09d", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="2c64666c7491596409eaff66d7f264b2e95c9966d090800883ba9fb0ad2f0dd065d0994a4bb935f95a84db04148d0a4e4ded8e08a653e0396d334378bb8fdb86fbd45f1dc618f302f1ba71dc53f7273dc578e936ba0f2eb4d9150e79854bd68e79db0a4cbc17aa6a351a257e3bc6b3e637f59e96e5fb821709cd81a8cf6a769f14e7cd9d54e471e6a3412fb2089de7fba0cf187f959f118212ce551986e3d085485e548ce0469366d3673479785b8194cc1e634ed34a09a2f43e06fa6376531fe78213fc1233032f1a699d8c2b359104a7269909ee6745db08be304fc052af45000000", @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRESHEX=r1, @ANYRESDEC=r1, @ANYRES32=r6, @ANYRES16=r5, @ANYRESHEX=r0, @ANYRESOCT=r7, @ANYRES64=r0, @ANYRES16=r0, @ANYRES32=r4], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r10}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$BLKGETSIZE(r10, 0x1260, &(0x7f0000000080)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:07:42 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x8, 0x3) 11:07:42 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:42 executing program 1: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file0\x00'}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r1, 0x2, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x40, 0x0, 0x9, 0x2}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40040}, 0x4004) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="080025bd700008dbdf25010000000000000009410000004c00188000000073797a3100"/98], 0x68}, 0x1, 0x0, 0x0, 0x4800}, 0x80) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x14) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendmsg$NL80211_CMD_SET_NOACK_MAP(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x54, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xc4ae}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x20}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x2}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xfff9}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xfffa}, @NL80211_ATTR_NOACK_MAP={0x6}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x400}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x880) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 11:07:42 executing program 3: mlock2(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x4, 0xffffffffffffffff) 11:07:42 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f02", @ANYRESHEX=r1, @ANYRESOCT=r0, @ANYRESHEX=0xee00, @ANYBLOB="f400968bcd260ce0774f210e1c55ebcf5825648cf06780f46c85f218693096bafc9470a154da698b9d75d78dc7efe0a421fc121b2281c1b240946e727c7573c87988b9e2751bb3902b31c9a6b5b04cc88972b3bb621a7e33464d8caad60f8e906ec3f43d75c60a0539c9e5297e2b8b9c9da4266f71a1a548574fa835823ab8b6e9929584423263de5640f454d2d6e7b5870f75ddcd38ecf3", @ANYRESDEC, @ANYRES32]) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/233, 0xe9}], 0x1, 0x2, 0x100) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) 11:07:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x1e00, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:42 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:42 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x2, 0xffffffffffffffff}) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x4000, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:57 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:57 executing program 0: mlock2(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x0) pkey_mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x9, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) mmap$IORING_OFF_SQ_RING(&(0x7f0000fee000/0x2000)=nil, 0x2000, 0x3000000, 0x10, r1, 0x0) 11:07:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x100000, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:57 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x40) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:07:57 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000000)) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, r0) get_mempolicy(&(0x7f0000000200), &(0x7f0000000240), 0x0, &(0x7f0000fee000/0xf000)=nil, 0x3) 11:07:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r1, &(0x7f0000000040)=0x1, 0xc653) socket$netlink(0x10, 0x3, 0x13) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="2c77bfb7413466646e6ff768bc0a4bb04dc13720abeec182ad76e75c74b9dd14541fe8497f59454c6571c735d4f24b0e8278a527140ac0617779d0a2c29955419bd472be3c20c59add62d60fc2f1cdf02d89f0a4a0", @ANYRESHEX=r3, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000080)=0x6) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:07:57 executing program 5: unshare(0x2a040600) unshare(0x800) unshare(0x20400) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x2000000) 11:07:57 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, r0) pkey_mprotect(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x6800006, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:57 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x0) mmap$usbmon(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x2000005, 0x11, r0, 0x10000000000006) 11:07:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:57 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x400000c, 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x5]}, 0x8) mmap$usbmon(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000006, 0x110, r0, 0x8) 11:07:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x1000000, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:07:57 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x3f, 0x2, 0x20, 0x0, 0xc82, 0x40, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x20, 0x4, 0x8, 0x9, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, r0, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) syz_io_uring_setup(0x6d1f, &(0x7f00000000c0)={0x0, 0xbc36, 0x4, 0x1, 0x281, 0x0, r1}, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_FSYNC={0x3, 0x1, 0x0, @fd_index=0x8}, 0x5) 11:07:58 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000)=0xd7, 0x3, 0x2) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000040)=0x6315, 0x10001, 0x3) mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x17) 11:07:58 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:07:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000340)={0xe4, 0x0, &(0x7f0000000200)=[@acquire={0x40046305, 0x3}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000080)={@flat=@binder={0x73622a85, 0xa, 0x1}, @fda={0x66646185, 0x8, 0x0, 0x3a}, @ptr={0x70742a85, 0x0, &(0x7f0000000040)=""/57, 0x39, 0x2, 0x25}}, &(0x7f0000000100)={0x0, 0x18, 0x38}}}, @increfs={0x40046304, 0x3}, @increfs, @release={0x40046306, 0x3}, @increfs_done, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000140)=ANY=[@ANYBLOB="856164660000000004000000000000010000000000002500"/38, @ANYRES32=r0, @ANYBLOB="0000000000000000000000008561646600000000030000000000000000000000000000002900000000000000"], &(0x7f00000001c0)={0x0, 0x20, 0x38}}, 0x1000}, @release={0x40046306, 0x2}, @clear_death={0x400c630f, 0x3}], 0x2f, 0x0, &(0x7f0000000300)="f12b5a6abbcd626b5a0a18296e965f76a303feaf652156577c0e0c11711ae2c73306299685f90f31c357cea4318ea9"}) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f0000000400)={&(0x7f0000000380)=""/76, 0x4c, 0x1, 0x40}) 11:07:58 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) lseek(r2, 0x5, 0x0) 11:07:58 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x0) 11:07:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x10000000, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 2490.551689] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:08:23 executing program 6: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:08:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mmap$usbmon(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3000002, 0x1010, 0xffffffffffffffff, 0x100) 11:08:23 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x34000, 0x0) mmap$usbmon(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x3) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, 0x4000010, r2, 0x1) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x4, &(0x7f0000ffd000/0x3000)=nil) 11:08:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:08:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:08:23 executing program 5: unshare(0x32030200) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:08:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x1e000000, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:08:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x4, r0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:08:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:08:23 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x6, 0xffffffffffffffff) 11:08:23 executing program 5: unshare(0x2a040600) unshare(0x22000100) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:08:23 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:08:23 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x1, 0x2) 11:08:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:08:23 executing program 0: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 2514.211700] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:08:45 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd, 0x100000001, 0x0, 0x2c45, 0x3}, 0x5f1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:08:45 executing program 5: unshare(0x2a040600) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x410000, 0x0) clone3(&(0x7f00000000c0)={0x282018900, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 11:08:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x40000000, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:08:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)=0x2) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) fcntl$setlease(r0, 0x400, 0x0) socket$netlink(0x10, 0x3, 0x15) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x184601, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000080)=""/57) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:08:45 executing program 3: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20008000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000000150a01030000000000000000080000d00340000000004e144ad4c8c600000000"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0xc4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ff3000/0x3000)=nil, 0x3000, 0x1, r0) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x1000001, r0) mlock2(&(0x7f0000fec000/0x3000)=nil, 0x3000, 0x1) mbind(&(0x7f0000fec000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000100)=0x5, 0xe0, 0x6) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x8, r0) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x2000000, r0) 11:08:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:08:45 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00'}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:08:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000240), 0x100040, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@cache_none}, {@uname={'uname', 0x3d, '^'}}, {@access_client}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '@)'}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@context={'context', 0x3d, 'staff_u'}}]}}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYRESHEX=r4, @ANYRES64=r2], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r7, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x4, 0x7, 0x40, 0x3, 0x2, 0x6, 0x401, 0x1bf, 0xfffffffffffffee1, 0x2a2, 0x200, 0x7f, 0x38, 0x1, 0x8000, 0x97d, 0x5}, [{0x6, 0xfff, 0x4, 0x2, 0xfff, 0x91b1, 0x1, 0x1}], "b51d58"}, 0x7b) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:08:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mlock2(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x1) madvise(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x14) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ff8000/0x3000)=nil) 11:08:45 executing program 3: pwrite64(0xffffffffffffffff, &(0x7f0000000000)="921c4465d623b5224f727f7813335dabfeb4ec1054f13008065a29bd808e94c009f11b7a9db101409bbec682d6cdf48240d065a99d8d077952de3579be80ce60204a36df50c4be6d11de48eddb0a58ae7671cf5880ada17a42f8aa8a510ea870a8c85803b9304d64c8ad843afda67ad526c95008ba608d96c60daab858e397d43d8e0f2f6a2830160353733f00cd6df0a54c6230a2", 0x95, 0xc00) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:08:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:08:45 executing program 7: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x28) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000080)={0x0, 0x7f, 0x3, 0x3, 0x3ff}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x4000, &(0x7f0000000000)=0xeb, 0x7f, 0x0) madvise(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0xb) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000fed000/0x1000)=nil, 0x1000) 11:08:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0xfdfdffff, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 2539.217614] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:09:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x0, 0xee00}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@fowner_lt={'fowner<', r3}}, {@obj_role={'obj_role', 0x3d, '%^]\'&'}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000140)=0x4) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0xfdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x12) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x210000, 0x0, 0x7}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r7, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r6}, './file1\x00'}) ioctl$VT_WAITACTIVE(r6, 0x5607) socket$netlink(0x10, 0x3, 0x15) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x1}, 0x8) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$KDSKBMETA(r8, 0x4b63, &(0x7f0000000300)=0x4) ioctl$SNAPSHOT_SET_SWAP_AREA(r6, 0x400c330d, &(0x7f0000000080)={0x1f, 0x3}) 11:09:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="dd97"]) ftruncate(r0, 0xab9) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x16) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0xfffffdfd, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:09 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0x9, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 11:09:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_evm(r0, &(0x7f0000000080), &(0x7f0000000200)=@v2={0x3, 0x2, 0x14, 0x5, 0x6b, "7df0f98a524778a2253a723f4dfaaa4e01161eb6df87ab8cd4fd1f1481921c1bc04d65b3075187cdc4b620f75f22d98d65614fb883637e68744942edfdbfc4201d14226303a489469c3d7e08aded6cf841bc2289f78d95a8213a11f464d815e384a08c2eb06791ede26675"}, 0x74, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRES16=r2, @ANYRES32, @ANYRESHEX=r0, @ANYRESDEC=r1], 0xfe2e) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:09:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0xa) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:09:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:09 executing program 5: unshare(0x2a040600) unshare(0x80000000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:09:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:09:09 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:09 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x28) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000080)={0x0, 0x7f, 0x3, 0x3, 0x3ff}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x4000, &(0x7f0000000000)=0xeb, 0x7f, 0x0) madvise(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0xb) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000fed000/0x1000)=nil, 0x1000) 11:09:09 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7, 0x6, 0x40, 0x3, 0x0, 0x2, 0x40000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0x1, 0x4, 0x2, 0x0, 0x8, 0x1, 0x0, 0xffffffff, 0x0, 0x20}, 0x0, 0x7, r0, 0x2) 11:09:09 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_AP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @void}}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x1) unshare(0x2a040600) 11:09:09 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000001, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:09 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r9, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES16=r7, @ANYRES32=r1], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:09:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = signalfd4(r0, &(0x7f0000000080)={[0x8]}, 0x8, 0x800) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) socket$netlink(0x10, 0x3, 0x15) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) fallocate(r2, 0x21, 0x1, 0x8ff) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2559.766096] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:09:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB='o\n', @ANYRESHEX=r2, @ANYRESOCT=r1, @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) ioctl$BTRFS_IOC_LOGICAL_INO(r2, 0xc0389424, &(0x7f00000000c0)={0x200, 0x50, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) openat$incfs(r4, &(0x7f0000000100)='.log\x00', 0xc000, 0x180) 11:09:30 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200c02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:09:30 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) r0 = pkey_alloc(0x0, 0x0) mlock(&(0x7f0000ff2000/0x4000)=nil, 0x4000) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000002, r0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x10000, 0x20) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:30 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7, 0x6, 0x40, 0x3, 0x0, 0x2, 0x40000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0x1, 0x4, 0x2, 0x0, 0x8, 0x1, 0x0, 0xffffffff, 0x0, 0x20}, 0x0, 0x7, r0, 0x2) 11:09:30 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000fed000/0x13000)=nil, 0x13000) 11:09:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x10, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:30 executing program 5: unshare(0x2a040600) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/ehci_hcd', 0x201020, 0x211) unshare(0x2000100) unshare(0x0) 11:09:30 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000000)=0x1000001000, 0x80, 0xb) pkey_mprotect(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x535, 0x3) mbind(&(0x7f0000b27000/0x4000)=nil, 0x4000, 0x8000, &(0x7f0000000040)=0x4, 0x3f, 0x1) 11:09:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, 0x0, 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x28}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x8, 0x2, 0xa, @mcast2, @local, 0x40, 0x10, 0x1, 0x5}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000000100)={0x550, r3, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_MODES={0xb4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_MASK={0x9e, 0x5, "c0f3380be8524ab4642308b195296dc48d4df32c923a0fe2dc3dc33154a82fc9eecaf3386c621df3536ec1ee76d9bd5da184b466f0729127b83533a99343153619c53ae40d193ebcaeee3be0f68039a0af78c7148f9b27f6a272b9c4c8e2e3955c5a5bab33b287d3d5f7f16b6c949792020cf212499f080eb4eb8ed8fec961b7bfce82b6f01f50a32f6dfd0afbb395d66b56a8bc34128b53b0d4"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffff}]}, @ETHTOOL_A_WOL_SOPASS={0x7c, 0x3, "2cd264518b3955ce2a359035b6ca44224a1b1108a5224cba026c27ef0ba7311cbbc403e5a50831f47fcebf296da4672d518c6a0ed53e3587926359fb21b0a87f9437f148328166a6ce8e08070ae47618f75855af5443e2fc2095c903a98c8aace6a1db5902da2d00291db7f3906d3fd1359188feba1b066a"}, @ETHTOOL_A_WOL_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x9d7c4ad646dec1ec}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_WOL_HEADER={0xb4, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @ETHTOOL_A_WOL_MODES={0x258, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x3e, 0x4, "a54dc8017459e5da18b95745516511934f47871bf43fb9d1e3165e3188100a8526035c269dc03a4bdeb21da4ec5848bdf265cae1ef02999818ba"}, @ETHTOOL_A_BITSET_MASK={0x86, 0x5, "e1b4d22f4b3b235d72f1c17cec5a82374a116cf8a41852a0e6088f878710e659512a183e270eb180d0736ec3fdc65c1db7127ad1dbbb73f6379bf91d3151c1ce8da2c09a666c7ce81ad1bab537cf8189c714c5e49e7054d89e2a5bc3117760ef3464d962c28ac8c8bea55f0969b19334149dd7c9f83a418105020aa580614641ab4e"}, @ETHTOOL_A_BITSET_BITS={0x184, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ')%t{(]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ':\\@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '+--+&}{\\$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '+}%,-]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '.+#%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '(@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ',$].\\.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40004000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\v+(:@@},\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\'@$(\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']\\(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xe4\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x20}]}, @ETHTOOL_A_WOL_SOPASS={0x68, 0x3, "e22cc360c28ccccd005e84e701cddbc76d66a34b3e1401827da34dd50982e117b3a79fec60ddfbbff03fa8756a77ed34923884dc9e58f4b8e33812e160d18bf61827cce96ac780313936686a36dab10eed154305cf6ad04d9d35d6b57c4052739397f881"}]}, 0x550}, 0x1, 0x0, 0x0, 0x800}, 0x4000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x1e, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:30 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101000, 0x80) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x282000, 0xa) mbind(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x6, 0x800, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:30 executing program 1: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x1a) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x4) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:09:30 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc00, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000003c0)={0xfffa, 0x4, 0x6, 0x4, 0x6, 0x2}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x15) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340), 0x400000, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000200)) fcntl$setstatus(r0, 0x4, 0x4000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r1) sendmsg$DEVLINK_CMD_SB_POOL_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6, 0x11, 0x401}}]}, 0x44}}, 0x20000080) r4 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000240), 0x111400, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/partitions\x00', 0x0, 0x0) splice(r4, &(0x7f0000000280)=0x1, r5, &(0x7f0000000300)=0xfffffffffffffff9, 0x8, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:09:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:30 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x84400, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000240)) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000080)={0x12, 0x3a, 0x2, 0x3, 0x9, 0xffff, 0x1, 0xaa, 0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/udp6\x00') mq_getsetattr(r1, &(0x7f0000000700)={0x6, 0x6, 0x8}, &(0x7f0000000740)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) statx(r3, &(0x7f00000006c0)='./file0\x00', 0x110ad7633a1878ae, 0x200, &(0x7f0000000140)) r4 = fsopen(&(0x7f0000000040)='bdev\x00', 0x69afe3f12a639edc) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) dup3(r0, r2, 0x0) fsmount(r4, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="7472616e733d66642c3666646e6f3df4bf12f1dfb2d098596bdceab80abe8c", @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) fsmount(r6, 0x0, 0x1fe) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f00000000c0)='mand\x00', 0x0, 0x0) unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x9b5c200, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2582.177673] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:09:52 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000008, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:52 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x1) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000180)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_AUTHENTICATE(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r5, 0x100, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xfffffc00, 0x51}}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x7}], @NL80211_ATTR_MAC={0xa, 0x6, @random="9080eb067146"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040000}, 0x14) 11:09:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x1e00, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:52 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:09:52 executing program 5: unshare(0x2a040600) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_io_uring_complete(0x0) clone3(&(0x7f0000000200)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x24}, &(0x7f00000000c0)=""/165, 0xa5, &(0x7f0000000180)=""/53, &(0x7f00000001c0)=[0x0, 0x0, r0], 0x3, {r1}}, 0x58) unshare(0x800) request_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='\x00', 0xfffffffffffffffe) 11:09:52 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0x6, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@mmap}], [{@hash}, {@euid_gt={'euid>', 0xee00}}]}}) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000040)) [ 2590.771118] FAULT_INJECTION: forcing a failure. [ 2590.771118] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2590.773608] CPU: 1 PID: 12703 Comm: syz-executor.0 Not tainted 5.10.162 #1 [ 2590.775006] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2590.776726] Call Trace: [ 2590.777284] dump_stack+0x107/0x167 [ 2590.778034] should_fail.cold+0x5/0xa [ 2590.778819] _copy_to_user+0x2e/0x180 [ 2590.779605] simple_read_from_buffer+0xcc/0x160 [ 2590.780549] proc_fail_nth_read+0x198/0x230 [ 2590.781419] ? proc_sessionid_read+0x230/0x230 [ 2590.782336] ? security_file_permission+0x24e/0x570 [ 2590.783336] ? perf_trace_initcall_start+0x101/0x380 [ 2590.784400] ? proc_sessionid_read+0x230/0x230 [ 2590.785322] vfs_read+0x228/0x580 [ 2590.786044] ksys_read+0x12d/0x260 [ 2590.786762] ? vfs_write+0xa30/0xa30 [ 2590.787538] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2590.788603] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2590.789651] do_syscall_64+0x33/0x40 [ 2590.790411] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2590.791446] RIP: 0033:0x7fd7706d569c [ 2590.792215] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2590.795976] RSP: 002b:00007fd76dc77170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2590.797519] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fd7706d569c [ 2590.798980] RDX: 000000000000000f RSI: 00007fd76dc771e0 RDI: 0000000000000005 [ 2590.800422] RBP: 00007fd76dc771d0 R08: 0000000000000000 R09: 0000000000000000 [ 2590.801850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2590.803304] R13: 00007ffcd12c300f R14: 00007fd76dc77300 R15: 0000000000022000 11:09:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x4000, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(0xffffffffffffffff, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:09:53 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000004fc0)='memory.numa_stat\x00', 0x0, 0x0) dup3(r0, r1, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:09:53 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x8, 0x6) [ 2603.669221] kmemleak: 42 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:10:21 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:10:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x100000, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:10:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, 0x0) 11:10:21 executing program 5: unshare(0x2a040600) unshare(0x20880) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:10:21 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x10082, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f0000000040)=0x7fffffff) 11:10:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYRESOCT=r4, @ANYRESDEC=r5, @ANYRESOCT=r8, @ANYRESHEX=r8, @ANYRES16=r6, @ANYRES64=r9, @ANYRES64=r10], 0xfdef) socket$netlink(0x10, 0x3, 0xa) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:10:21 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x4) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x5000004, 0x32, r0, 0x25) 11:10:21 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x2, 0x3, 0xec, 0x0, 0x1, 0x20000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x19, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x4, 0x9, 0x4, 0x4, 0x3, 0x7ff, 0xfff, 0x0, 0xffffffff, 0x0, 0x4}, 0x0, 0xb, r0, 0x2) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:10:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, 0x0) 11:10:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x1000000, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:10:21 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000000, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) munlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x1000008, r0) 11:10:21 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, &(0x7f0000000040)=0x7, 0x4, 0x5) mbind(&(0x7f0000fe6000/0x13000)=nil, 0x13000, 0x2, &(0x7f0000000000)=0x9, 0x7, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000080)=0x7, 0x3, 0x5) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 11:10:21 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x36}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:10:21 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 11:10:21 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x40000) 11:10:21 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000000), 0x9, 0x6) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6000, 0x4, &(0x7f0000ff7000/0x6000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:10:21 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x9) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0xfede, 0x7f, 0x15, 0xfffffb82, 0x8, "d6e7d6aaa28687a6c34653856d3fa4b9924825"}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0xb) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f00000000c0)) 11:10:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x10000000, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:10:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, 0x0) [ 2634.537195] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:10:45 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000280)={0x1, 0x0, 0x8, 0x2, 0x7f}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) close(r0) unshare(0x2a040600) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="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", @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000440)=ANY=[@ANYRES16=r3, @ANYRES16=r1, @ANYRESOCT=r6]) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) unshare(0x2000000) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r8, 0x80605414, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0xffffffffffffffff, 0x1, 0x2, 0x3, 0x8001}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:10:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x115e42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x212480, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:10:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pwritev2(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000040)="ed0e1f7598fb", 0x6}], 0x1, 0x101, 0x1, 0x2) socket$netlink(0x10, 0x3, 0x15) syz_open_dev$tty1(0xc, 0x4, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x101100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x34, 0x65, 0x32, 0x61, 0x37, 0x31, 0x32], 0x2d, [0x34, 0x66, 0x39, 0x57], 0x2d, [0x35, 0x63, 0x38, 0x33], 0x2d, [0x38, 0x61, 0x39, 0x39], 0x2d, [0x65, 0x61, 0x62, 0x64, 0x32, 0x32, 0x56, 0x66]}}}]}}) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 11:10:45 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x4000, &(0x7f0000000000)=0x8, 0x3, 0x0) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0x20000000000003fe, 0x0) mbind(&(0x7f0000fee000/0x1000)=nil, 0x1000, 0x2, 0x0, 0x0, 0x3) r2 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xd, r2) 11:10:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x6c}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:10:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x1e000000, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:10:45 executing program 2: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x2, 0x3, 0xec, 0x0, 0x1, 0x20000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x19, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x4, 0x9, 0x4, 0x4, 0x3, 0x7ff, 0xfff, 0x0, 0xffffffff, 0x0, 0x4}, 0x0, 0xb, r0, 0x2) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:10:45 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) mbind(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000000)=0x21c5, 0x7, 0x0) 11:10:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) (fail_nth: 1) 11:10:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x40000000, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:10:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xa2}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:10:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) fcntl$addseals(r3, 0x409, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$KDGETLED(r4, 0x4b31, &(0x7f0000000080)) [ 2643.790008] FAULT_INJECTION: forcing a failure. [ 2643.790008] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2643.792487] CPU: 0 PID: 13225 Comm: syz-executor.2 Not tainted 5.10.162 #1 [ 2643.793886] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2643.795566] Call Trace: [ 2643.796111] dump_stack+0x107/0x167 [ 2643.796861] should_fail.cold+0x5/0xa [ 2643.797642] _copy_to_user+0x2e/0x180 [ 2643.798428] simple_read_from_buffer+0xcc/0x160 [ 2643.799383] proc_fail_nth_read+0x198/0x230 [ 2643.800282] ? proc_sessionid_read+0x230/0x230 [ 2643.801218] ? security_file_permission+0x24e/0x570 [ 2643.802232] ? perf_trace_initcall_start+0x101/0x380 [ 2643.803276] ? proc_sessionid_read+0x230/0x230 [ 2643.804217] vfs_read+0x228/0x580 [ 2643.804932] ksys_read+0x12d/0x260 [ 2643.805650] ? vfs_write+0xa30/0xa30 [ 2643.806417] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2643.807482] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2643.808549] do_syscall_64+0x33/0x40 [ 2643.809311] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2643.810351] RIP: 0033:0x7fd3301e869c [ 2643.811112] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2643.814855] RSP: 002b:00007fd32d7ab170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2643.816409] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd3301e869c [ 2643.817855] RDX: 000000000000000f RSI: 00007fd32d7ab1e0 RDI: 0000000000000004 [ 2643.819300] RBP: 00007fd32d7ab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2643.820754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2643.822201] R13: 00007ffcf067768f R14: 00007fd32d7ab300 R15: 0000000000022000 11:10:45 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x4280, 0x0) 11:10:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0xfdfdffff, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:10:46 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x430, 0x3) 11:10:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xe6fa) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x7fff) [ 2658.257616] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:11:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:11:08 executing program 5: unshare(0x2a040600) unshare(0x2000000) unshare(0x1c070500) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:11:08 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xd8}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:11:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0xfffffdfd, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200c02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:11:08 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, r0) 11:11:08 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:11:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:08 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x1, 0x4) remap_file_pages(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x1000004, 0x2, 0x2000) 11:11:08 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000005e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x40342, 0x9, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x7, 0x1, 0x2, 0x0, 0x0, 0x3f, 0x2000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x8, 0x7, 0x20, 0x7, 0x9, 0x9, 0x8, 0x0, 0xff, 0x0, 0x34f}, 0xffffffffffffffff, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xe2, 0x8, 0x3, 0x7, 0x0, 0x6e4d, 0x4000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_bp, 0xf2b, 0x40, 0x4, 0x7, 0x2b5a4000000, 0x3751, 0x100, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x200000a, 0x12112, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) syz_io_uring_setup(0x2669, &(0x7f0000000180)={0x0, 0xa57a, 0x20, 0x3, 0x1cf, 0x0, r3}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:11:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x8, 0x6, 0x400, 0x0, 0x17, "78058fa6fdc9cce9f262b64f69f809dc302edc"}) 11:11:08 executing program 6: sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xcc, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x1, 0x3}}}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x45}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x2}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0xb9}, @NL80211_ATTR_SCAN_SSIDS={0x90, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0x9, 0x0, @random="3c068355fb"}, {0x7, 0x0, @random="d0f991"}, {0xa, 0x0, @default_ibss_ssid}, {0x22, 0x0, @random="770706ba26e9812b58eb0dc15bf46b06cce0f37ee2871ed9c92efc84b01d"}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:11:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:08 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x10e}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:11:08 executing program 5: unshare(0x20000000) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:11:08 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000002, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, r0) [ 2683.265201] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:11:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x4b47, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x10, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:33 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x144}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:11:33 executing program 6: r0 = fork() ptrace(0x10, r0) ptrace$cont(0x7, r0, 0x0, 0x200000000000) ptrace$setsig(0x4203, r0, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) clone3(&(0x7f0000000540)={0x23100080, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0, {0x1f}, &(0x7f0000000340)=""/252, 0xfc, &(0x7f0000000440)=""/183, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) r2 = getpid() r3 = fork() ptrace(0x10, r3) ptrace$cont(0x7, r3, 0x0, 0x200000000000) ptrace$setsig(0x4203, r3, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) clone3(&(0x7f0000000600)={0x10000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x21}, &(0x7f0000000100)=""/72, 0x48, &(0x7f0000000180)=""/219, &(0x7f00000005c0)=[r0, 0x0, r1, 0xffffffffffffffff, r2, r3], 0x6}, 0x58) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r4, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) 11:11:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = syz_open_pts(r0, 0x200100) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) r2 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_generic(r2, &(0x7f0000002400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000023c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x230c}, 0x1, 0x0, 0x0, 0x40040}, 0x9e0fbf512eaeb306) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000004800)={0x3, 0x6, 0x100, 0x7, 0xf2, "6289568de31eb4e176dc9dca8d3ab5eb747fe9", 0x4, 0x499}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004640)=[{{&(0x7f0000002440), 0x6e, &(0x7f0000002780)=[{&(0x7f00000024c0)=""/131, 0x83}, {&(0x7f0000002580)=""/155, 0x9b}, {&(0x7f0000002640)=""/28, 0x1c}, {&(0x7f0000002680)=""/14, 0xe}, {&(0x7f00000026c0)=""/94, 0x5e}, {&(0x7f0000002740)=""/56, 0x38}], 0x6, &(0x7f0000002800)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000002940)=""/83, 0x53}, {&(0x7f00000029c0)=""/253, 0xfd}, {&(0x7f0000002ac0)=""/52, 0x34}, {&(0x7f0000002b00)=""/201, 0xc9}, {&(0x7f0000002c00)=""/77, 0x4d}, {&(0x7f0000002c80)=""/105, 0x69}, {&(0x7f0000002d00)=""/205, 0xcd}], 0x7}}, {{&(0x7f0000002e80)=@abs, 0x6e, &(0x7f0000004000)=[{&(0x7f0000002f00)=""/113, 0x71}, {&(0x7f0000002f80)=""/4096, 0x1000}, {&(0x7f0000003f80)=""/96, 0x60}], 0x3, &(0x7f0000004040)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x68}}, {{&(0x7f00000040c0)=@abs, 0x6e, &(0x7f0000004340)=[{&(0x7f0000004140)=""/251, 0xfb}, {&(0x7f0000004240)=""/247, 0xf7}], 0x2}}, {{&(0x7f0000004380)=@abs, 0x6e, &(0x7f0000004580)=[{&(0x7f0000004400)=""/112, 0x70}, {&(0x7f0000004480)=""/161, 0xa1}, {&(0x7f0000004540)=""/25, 0x19}], 0x3, &(0x7f00000045c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}], 0x5, 0x0, &(0x7f0000004780)) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f00000047c0)=0x5) 11:11:33 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x20c0900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3d}, 0x58) 11:11:33 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000004, 0x110, r0, 0x7) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) move_pages(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil], &(0x7f0000000040)=[0x101, 0x5, 0x9, 0xfffffad0, 0x7fff, 0x2, 0x7, 0x1, 0x8], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) 11:11:33 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:11:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1e, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 2704.915842] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:11:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000fed000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ff6000/0x3000)=nil) mmap$usbmon(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6, 0x10, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x3000006) 11:11:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x17a}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:11:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000200)={0x2, 0x8, 0xa4, 0x7fff, 0xfc, "34f9d17d3e36fe28e40755c0df0de66aff8b32", 0x100, 0x5}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x200, 0x100) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/172}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) 11:11:55 executing program 5: unshare(0x2a040600) clone3(&(0x7f0000000000)={0x40000100, 0x0, 0x0, 0x0, {0x200000}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x24040200) 11:11:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x4b49, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:11:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1e00, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:55 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_alloc(0x0, 0x1) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_alloc(0x0, 0x2) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, r2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:11:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5401, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:55 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0x1, 0x195d4abc, 0x6) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffa000/0x3000)=nil) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x401, &(0x7f0000ff3000/0x2000)=nil, 0x2) 11:11:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0x2, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:11:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6b6c03, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)=0xffff8000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000cb7f8d6951fe5de69f000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c653000"]) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x0, 0x6, 0x9}]}, 0xfffffffffffffd58}, 0x1, 0x0, 0x0, 0x20004001}, 0x40) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:11:55 executing program 5: unshare(0x2a040600) unshare(0x60000200) unshare(0x80) 11:11:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:11:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x1b0}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:11:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/pci_hotplug', 0x448880, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYRES32=r5, @ANYRES32, @ANYBLOB="00000000000000002e2f666900767aa55df5d9f9bbf366a1625ab954aa71a99d1f5b6d9fdfaab2e748e0d856c51b97a60fd27718d71c000000000000"]) sendfile(r2, r1, &(0x7f0000000080)=0xe05, 0x5) 11:11:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000)=0x9, 0x3, 0x6) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) syz_io_uring_setup(0x2977, &(0x7f0000000080)={0x0, 0x431e, 0x10, 0x2, 0x1, 0x0, r1}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff4000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 2728.460475] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:12:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000000, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:19 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x1e6}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:12:19 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$sock_ifreq(r1, 0x89b3, &(0x7f0000000040)={'syz_tun\x00', @ifru_addrs=@ax25}) 11:12:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:19 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1250580, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x4000000) unshare(0x40020200) 11:12:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfe0f) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:12:19 executing program 7: mlock2(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x3, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x401, 0x8, 0x5) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000fee000/0x4000)=nil, 0x4000, 0xd, r0) 11:12:19 executing program 3: mlock2(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mbind(&(0x7f0000fee000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000000)=0x1, 0x8, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000fee000/0x2000)=nil, 0x2000, 0x3000009, r0) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x2000000, r1) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, 0x0, 0xff7fffffffff8260, 0x1) mbind(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000040)=0xfffffffff351bb8f, 0x3, 0x6) mremap(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x3000, 0x7, &(0x7f0000ff4000/0x3000)=nil) mlock2(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x1) 11:12:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x10000000, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:19 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mlock2(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xc) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:12:19 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:12:19 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x21c}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:12:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5405, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:19 executing program 6: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x9a, 0x70bd25, 0x25dfdbfe, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0xba}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x81}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x2008015) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x100}}, './file0/file0\x00'}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7fffffff}}, './file0\x00'}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x5bb40e7e, 0x1f, 0x1ff, 0x4, 0x4, "ed97a544c40c6b2b36a787aa52214423333cb6"}) 11:12:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 2752.896533] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:12:44 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:12:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x12) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:12:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) setsockopt$inet6_int(r2, 0x29, 0x81, &(0x7f0000000040)=0x1, 0x4) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:12:44 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000040)='\\\x00', &(0x7f0000000080)='!%&*@\x00', &(0x7f00000000c0)='%,&,\x00'], &(0x7f0000000340)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='$:+%\xc8\x00', &(0x7f00000001c0)='v\x00', &(0x7f0000000200)='_\x00', &(0x7f0000000240)='\'|\\p\x00', &(0x7f0000000280)='@)@![,!\'/\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], 0x800) unshare(0x10020800) 11:12:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x252}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:12:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5406, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1e000000, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:12:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5407, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:44 executing program 5: unshare(0x2a040600) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fork() ptrace(0x10, r1) ptrace$cont(0x7, r1, 0x0, 0x200000000000) ptrace$setsig(0x4203, r1, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) r2 = fork() ptrace(0x10, r2) ptrace$cont(0x7, r2, 0x0, 0x200000000000) ptrace$setsig(0x4203, r2, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) waitid(0x1, r0, &(0x7f0000000340), 0x1000000, 0x0) unshare(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB="b784edb3bc0f2c", @ANYRESHEX=r4, @ANYBLOB="2c6f626a5f757365723d25295c2f2449282e2a96272c66736d616769633d3078303030303030303030303030303163662c736d61636b66737472616e736d7574653d2c736d61636b6673666c6f6f723d2a0900aa6e1f2c736d61636b66737472616e736d7574653d2c7375626a5f747970653d6f626a5f757365722c7065726d69745f646972656374696f2c00"]) clone3(&(0x7f0000000280)={0x15240400, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3e}, &(0x7f00000000c0)=""/232, 0xe8, &(0x7f00000001c0)=""/120, &(0x7f0000000240)=[r1, r0, r2], 0x3, {r4}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000300)) 11:12:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x40000000, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:44 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x34, r5, 0x1, 0x70bd28, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x11}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x25}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x38}, @NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x9}]}, 0x34}}, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r6, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r6, 0x5437, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), r2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB='^ME\x00']) write$tun(r8, &(0x7f0000000040)={@void, @val={0x2, 0x4, 0xff, 0xfff9, 0x1000, 0xfeff}, @x25={0x0, 0x2, 0xf3, "b5ffb956c87cdad1b1d3794f7b00ade2b5415ad41115315ae8119f89c325e184be"}}, 0x2e) r9 = accept$inet(r7, &(0x7f0000000080)={0x2, 0x0, @private}, &(0x7f0000000100)=0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r9, 0x40086607, &(0x7f0000000200)=0xfff) 11:12:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r3}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, '/dev/ptmx\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:12:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:12:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfdfdffff, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5409, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:12:45 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2775.990486] kmemleak: 30 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:13:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x12) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x202002, 0x10, 0xf}, 0x18) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f00000000c0)=""/38, &(0x7f0000000100)=0x26) 11:13:06 executing program 5: unshare(0x2a040600) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) clone3(&(0x7f00000008c0)={0x82000000, 0x0, 0x0, 0x0, {0x3e}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x54) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) 11:13:06 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 11:13:06 executing program 6: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0x401) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) dup(r1) pipe(&(0x7f0000000100)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000080)={0x847e, 0x10001}) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 11:13:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffdfd, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:06 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:13:06 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x1800003, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) madvise(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x14) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r1) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000d, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:13:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:06 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) fchmod(r0, 0x7) 11:13:06 executing program 6: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000040)=0xffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 11:13:06 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:13:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0xb) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:13:06 executing program 5: unshare(0x2a040600) unshare(0x0) clone3(&(0x7f00000008c0)={0x323004900, 0x0, 0x0, 0x0, {0xfffffffe}, 0x0, 0x0, 0x0, 0x0}, 0x99) 11:13:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 2798.056373] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:13:28 executing program 5: unshare(0x2a040600) unshare(0x50000400) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:13:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x10, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0], 0xfdef) socket$netlink(0x10, 0x3, 0x12) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:13:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) 11:13:28 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x10) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:13:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:28 executing program 7: sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x48, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_SECCTX={0x29, 0x7, '/usr/lib/telepathy/mission-control-5\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}]}, 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x800) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r1, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x1f, 0x3f, 0x1, 0x7fffffff, 0x3, 0x6, 0x3, 0x2de, 0x40, 0x233, 0x2, 0x101, 0x38, 0x1, 0x8, 0x5, 0x2}, [{0x2, 0x0, 0x87, 0x8, 0x1, 0x0, 0x0, 0xffffffff}, {0x70000000, 0xdecb, 0x1f, 0x6, 0x8000, 0x111, 0xfffffffffffffff9, 0x7}], "c8df937a4ba531a437f8280ca1c0d965f99123928e2b87d856727bdd490fc2d855f973c1578322bda2f3a5f8b24f24bfce325c158b15b7514bd8817e60b74ff07cf982b55d890fe53a31d94ac9a83e3195d615b0ee63adcbea65201949f019c7fb646faabf6863f7e2dae2afc216682859242df9f58c255011e782ba5b7f10ad5db90128194a0859de57e61f8745451eb8aa7fc7f7439c5ffd34c8e968ea9e6d2d", ['\x00', '\x00']}, 0x351) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000004c0)={0x0, "bb9dd5"}, 0x6) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, r2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:13:28 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:13:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1e, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:28 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x4e) 11:13:28 executing program 7: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendmsg$AUDIT_TTY_GET(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x3f8, 0x200, 0x70bd2a, 0x25dfdbfc, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1080}, 0x20040004) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x201d040, &(0x7f0000000200)=ANY=[@ANYRESDEC=r6, @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYRESDEC=r3, @ANYRESHEX=0xee00, @ANYBLOB=',permit_directio,\x00']) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x7, 0x4, 0x4, 0x0, 0x401, 0x800, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x18, 0x1e, 0x3, 0xd, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x0, 0xfc6d}, 0xffffffffffffffff, 0xf, r4, 0x9) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0x2000003, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r8, @ANYBLOB="2c7766d08cb76d", @ANYRESHEX=r9, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) splice(r8, &(0x7f0000000380), r3, &(0x7f00000003c0)=0x7, 0x9, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r2) syncfs(r6) 11:13:28 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdaf) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:13:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:28 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x6e0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$VT_ACTIVATE(r2, 0x5606, 0x6) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) dup(r3) socket$netlink(0x10, 0x3, 0x15) r5 = syz_open_dev$mouse(&(0x7f0000000080), 0x6, 0x480) io_uring_enter(r5, 0x6300, 0xcbc4, 0x0, &(0x7f0000000100)={[0x1]}, 0x8) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:13:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) clone3(&(0x7f0000000300)={0x40000200, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), {0x32}, &(0x7f0000000100)=""/178, 0xb2, &(0x7f00000001c0)=""/221, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) fallocate(r1, 0x20, 0x1, 0x200) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2819.635746] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:13:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pidfd_getfd(r1, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) creat(&(0x7f0000000280)='./file1\x00', 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/204}) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) getsockopt(r5, 0x6, 0x8, &(0x7f00000002c0)=""/74, &(0x7f0000000080)=0x4a) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:13:49 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x540f, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:49 executing program 6: prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2a2880, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) ioctl$AUTOFS_IOC_FAIL(0xffffffffffffffff, 0x9361, 0xfbb) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x48880, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_TIMERSLACK(0x1e) close(r2) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) 11:13:49 executing program 3: pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x2000000, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000f, r0) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1, r2) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:13:49 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1c1000, 0x193) 11:13:49 executing program 5: unshare(0x2a040600) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x101202, 0x0) clone3(&(0x7f00000008c0)={0x210f0100, 0x0, 0x0, 0x0, {0xe9f5}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 11:13:49 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdb7) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:13:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x10}) 11:13:50 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000fef000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x4) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8000, &(0x7f0000000000)=0xff, 0x4, 0x7) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000040)=0x1, 0x7, 0x2) 11:13:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5410, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:13:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x1e}) 11:13:50 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4, 0x3) 11:13:50 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdb8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:13:50 executing program 5: unshare(0x2a040600) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 11:13:50 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xa, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:13:50 executing program 6: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0x8e, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004000}, 0x20004051) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r3, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000240)='./file1/file0\x00', &(0x7f00000000c0), 0x2000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) splice(r4, &(0x7f00000001c0)=0x99d, r4, &(0x7f0000000280)=0x8, 0x10001, 0x4) pidfd_getfd(r5, r4, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}]}}) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r9, {0x10001}}, './file1/file0\x00'}) ioctl$TIOCVHANGUP(r10, 0x5437, 0x0) flistxattr(r4, &(0x7f0000000040)=""/206, 0xce) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, 0x0, 0x800, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24045000}, 0x5) [ 2842.475002] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:14:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000040)=0x6, 0x4) 11:14:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5411, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:14:12 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x1b9, 0x8, 0x3, 0x3, 0x8, "37e0d0de2e409a1d"}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000180)={0x6, 0x0, 0x6, 0x4, 0x2, "e561d4fd090e3164"}) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCGPTPEER(r3, 0x5441, 0x1) splice(r1, &(0x7f00000000c0)=0x20, r2, &(0x7f0000000140)=0x4, 0x0, 0x6) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:14:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x1e00}) 11:14:12 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x3000)=nil, 0x4000) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:12 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdbb) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:14:12 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x7, r0, 0x0, 0x200000000000) ptrace$setsig(0x4203, r0, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0xf, 0x6, 0x0, 0x0, 0x4, 0x82140, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x740, 0x100, 0x3, 0x3, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0xfffffffffffffff8}, r0, 0x5, 0xffffffffffffffff, 0x8) 11:14:12 executing program 3: mlock2(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x0) mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000fed000/0x2000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mremap(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff6000/0x4000)=nil) madvise(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000007, r0) pkey_mprotect(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x2, r0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x10010, 0xffffffffffffffff, 0x10000000) 11:14:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5412, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:14:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x4000}) 11:14:13 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xada, &(0x7f0000ff7000/0x2000)=nil, 0x0) 11:14:13 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) dup3(r1, r0, 0x0) 11:14:13 executing program 5: unshare(0x2a040600) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00000000000000002e2f66696c65301e"]) clone3(&(0x7f00000008c0)={0x51100, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0xa0) 11:14:13 executing program 1: add_key(&(0x7f0000000280)='rxrpc\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="82d2bf13a8ab2f1fdccc70e842cae79cd5331fd4667733adad0fcce44addb5abb8893827e025bae168a976e348fb6efa4880e31e3809f08bc8a9a24f63ae9c38c1fb176a4c0659e42d63b618067c18de6c70038040bcf9e3e6c77a0eb60001e0868e18705e10d76c7625c113827334e7e7f67204347a64266abff136fc5d950afcb1b2700fc50652e75fe3f0d01f356d45", 0x91, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000640), 0x5, 0xa4380) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x22820020}, 0xc, &(0x7f0000000700)={&(0x7f00000003c0)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x44040) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000000040)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 11:14:13 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5413, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 2865.552548] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:14:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x100000}) 11:14:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5414, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:14:35 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdbe) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:14:35 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000002, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:14:35 executing program 6: getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x1}, &(0x7f0000000080)=0x28) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:14:35 executing program 5: unshare(0x0) clone3(&(0x7f0000000000)={0x1690e0500, 0x0, 0x0, 0x0, {0x1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x20000000) unshare(0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80080, 0xa0) 11:14:35 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000b, r0) 11:14:35 executing program 3: mlock2(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:35 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/151, 0x97, 0x0, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x1000000}) 11:14:35 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0xa) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000000c0)=0xffff) r2 = signalfd4(r1, &(0x7f0000000040)={[0x2]}, 0x8, 0x80000) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000080)={@mcast1}, 0x14) 11:14:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5415, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:14:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:14:35 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdc1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:14:35 executing program 5: unshare(0x2a040600) unshare(0x8010100) pipe(&(0x7f0000000040)={0xffffffffffffffff}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0xfffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) pipe(&(0x7f0000000000)={0xffffffffffffffff}) dup2(r1, r1) unshare(0x10010000) 11:14:35 executing program 3: chmod(&(0x7f0000000080)='./file0\x00', 0x47) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, &(0x7f00000000c0)=0x1000, 0x7ff, 0x1) madvise(&(0x7f0000ff1000/0x4000)=nil, 0x4000, 0x19) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4000000000000101, 0x3) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xffffffffffffd746, &(0x7f0000ff3000/0x4000)=nil, 0x1) 11:14:36 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000000)=0x1, 0x800000000000, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5416, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:14:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x10000000}) 11:14:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5418, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:14:51 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdc4) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:14:51 executing program 5: unshare(0x2a040600) unshare(0x50040100) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:14:51 executing program 7: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:51 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pkey_mprotect(&(0x7f0000ff6000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:51 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$CDROMSTART(r0, 0x5308) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 11:14:51 executing program 6: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000001e00)="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", 0x1000, 0x5, &(0x7f0000000000)={0x0, 0x3938700}) mq_timedsend(0xffffffffffffffff, &(0x7f0000001200), 0x0, 0x3, &(0x7f00000012c0)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {r4}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000100)={r4, 0x1000}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r12}, {}, {}, {}, {}, {r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000047340)={0x1f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r14}], 0x52, "716c5fee927457"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b800)={0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}], 0x2, "63f4db24faa4be"}) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r15, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r15, 0x5437, 0x0) 11:14:51 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000000)=0x1, 0x800000000000, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:51 executing program 7: prctl$PR_GET_SECUREBITS(0x1b) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:14:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x1e000000}) 11:14:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:14:51 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xde5) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:14:51 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdc4) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:14:51 executing program 5: unshare(0x2a040600) unshare(0x62020780) unshare(0x20200) clone3(&(0x7f0000000000)={0x1048100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:14:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5419, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:06 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdee) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:06 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) fcntl$setstatus(r0, 0x4, 0x4000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) copy_file_range(r2, &(0x7f0000000040)=0xfffffffffffffffe, r0, &(0x7f0000000080), 0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) r3 = accept(r1, 0x0, &(0x7f0000000100)) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x64, r4, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x6}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2d9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x83}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:06 executing program 5: unshare(0xa040000) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fork() ptrace(0x10, r1) ptrace$cont(0x7, r1, 0x0, 0x200000000000) ptrace$setsig(0x4203, r1, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = fork() ptrace(0x10, r3) ptrace$cont(0x7, r3, 0x0, 0x200000000000) ptrace$setsig(0x4203, r3, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) clone3(&(0x7f0000000200)={0x8000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/49, 0x31, &(0x7f0000000100)=""/176, &(0x7f00000001c0)=[r1, r2, r3, r0], 0x4, {r4}}, 0x58) 11:15:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x40000000}) 11:15:06 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x10000, 0x1, 0x0) 11:15:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:06 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/151, 0x97, 0x0, &(0x7f00000000c0)=""/4096, 0x1000}, &(0x7f0000001100)=0x40) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:15:06 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:15:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xfdfdffff}) 11:15:06 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdf1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdee) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:20 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x2000000000000000}, 0x20a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:15:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x15) sendmsg$IPSET_CMD_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8840}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x4, 0x6, 0xa00, 0x0, 0x0, {0x1, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000090}, 0x20008000) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdf4) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0xfffffdfd}) 11:15:20 executing program 5: unshare(0x2a040600) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x1a000080) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) clone3(&(0x7f0000000300)={0x10180, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x30}, &(0x7f00000000c0)=""/213, 0xd5, &(0x7f00000001c0)=""/143, &(0x7f0000000280)=[r0], 0x1, {r1}}, 0x58) r2 = signalfd(r1, &(0x7f0000000380)={[0x5]}, 0x8) dup(r2) 11:15:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001040), 0x26c42, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="00004f170d9b0000e000"/19, @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000001180), r1) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x24, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0xfffffffa}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40801) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) write$binfmt_elf64(r8, &(0x7f0000001080)=ANY=[@ANYBLOB="7000732d5f83436800c5fdbb06b50b7adecb06b002390481853af6de168b96f28e6a67f8da2e5094a0b4c792d51283ae6b579870d6f0fd03172dfd6283f12c6f84f8b70de7f00e361414e90b173692c1549c9f19bff5d44c1243b9b5a91080d578d06dd6c006185f8416d37c88846f70e9be99a3fe09c47cdb2608bd4cf64b8fe77e71027bac45adf29f69ae1a22f3118ddb72c1f8f20c704b3d5799df6399b4df94e8162e858a", @ANYRES16=r0, @ANYRESHEX=r0, @ANYRESHEX=r2, @ANYRES16=r3, @ANYRES64=r6, @ANYRES32=r4], 0xfdef) r9 = socket$netlink(0x10, 0x3, 0x15) fcntl$setlease(r6, 0x400, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) setsockopt(r9, 0x1, 0x2, &(0x7f0000000040)="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", 0x1000) 11:15:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40e02, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6c82, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) fallocate(r1, 0x1, 0x3, 0x5990) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdee) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:20 executing program 5: unshare(0x2a040600) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x7, r0, 0x0, 0x200000000000) waitid(0x2, r0, &(0x7f0000000000), 0x2, &(0x7f0000000140)) ptrace$setsig(0x4203, r0, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) tkill(r0, 0xe) clone3(&(0x7f00000008c0)={0x20104c000, 0x0, 0x0, 0x0, {0x3b}, 0x0, 0xff23, 0x0, 0x0}, 0x58) 11:15:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdf7) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x10}) 11:15:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5420, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x1e}) 11:15:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdee) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 2933.348768] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:15:43 executing program 6: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) syz_open_dev$mouse(&(0x7f0000000000), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 11:15:43 executing program 3: mlock2(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x0) mremap(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000fed000/0x2000)=nil) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mremap(&(0x7f0000ff2000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff6000/0x4000)=nil) madvise(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000007, r0) pkey_mprotect(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x2, r0) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xc, 0x10010, 0xffffffffffffffff, 0x10000000) 11:15:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x460c02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:43 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdfa) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:43 executing program 5: unshare(0x2a040600) unshare(0x40060c00) unshare(0x80) unshare(0x2000000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x416840, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) socket$netlink(0x10, 0x3, 0xe) 11:15:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5421, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x1e00}) 11:15:43 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x8, r0) 11:15:43 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdb8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x4000}) 11:15:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5422, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:43 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) copy_file_range(r0, &(0x7f0000000040)=0x9, 0xffffffffffffffff, &(0x7f0000000080)=0x10001, 0xe60, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) 11:15:43 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0xf) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe1b) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:44 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipv6_route\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) read(r2, &(0x7f0000000100)=""/217, 0xd9) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_trace_dev_match', 0x0, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f00000002c0)={0x83c2, 0x86, 0x5, 0x0, 0x0, [{{r1}, 0x2103}, {{r4}, 0x9}, {{}, 0x2}, {{}, 0x8001}, {{r0}, 0x8}]}) unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:15:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x100000}) 11:15:44 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x4, 0x3) 11:15:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5423, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:15:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)=0x1) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0], 0xfdef) socket$netlink(0x10, 0x3, 0x12) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:15:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe24) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:15:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x1000000}) [ 2957.852793] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:16:10 executing program 5: unshare(0x2a040600) unshare(0x42020100) unshare(0x4020100) clone3(&(0x7f00000008c0)={0x201040200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:16:10 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe27) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5424, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0xc02, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000080)) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:10 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) fchmod(r0, 0x7) 11:16:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) preadv2(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000000080)=""/213, 0xd5}, {&(0x7f00000001c0)=""/71, 0x47}], 0x3, 0x80, 0x8, 0x9) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000340)={0x0, 0x8, 0x1, 0x8, 0x0, "dab5f30fe394b5a515a8a74ec4dbc1a8a1452d", 0x4, 0x1}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000380)=0x100) r3 = socket$netlink(0x10, 0x3, 0x15) accept4(r3, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000180)=0x80, 0x80800) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x81, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f0000000300)=0xb227, 0x4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r7, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)={0x28, r8, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x28}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r3, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x20, r8, 0x400, 0x70bd26, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000090}, 0x40) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x10000000}) 11:16:10 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 11:16:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5425, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:10 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2a) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x1e000000}) 11:16:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x5220) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 2981.088124] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:16:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:31 executing program 5: unshare(0x2a040600) unshare(0x1000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:16:31 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2d) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:31 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) mbind(&(0x7f0000ff5000/0x3000)=nil, 0x3000, 0x4000, &(0x7f0000000000)=0x6, 0x10001, 0x1) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, &(0x7f0000000080)=0x2, 0x1000, 0x6) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) msync(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x5) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = pkey_alloc(0x0, 0x0) mbind(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000040)=0xc1a, 0x4, 0x5) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r0) pkey_mprotect(&(0x7f0000ff2000/0x2000)=nil, 0x2000, 0x1, r0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000008, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="2cf2000000000100"]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0xc, 0x30, r1, 0x0) 11:16:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x40000000}) 11:16:31 executing program 6: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000200)={"36fc739122227a2ec4421c87bbec0cc7", 0x0, 0x0, {0x7, 0x4}, {0x1, 0xf6}, 0x200, [0xfffffffffffff800, 0x2, 0x8, 0x44e, 0x0, 0xffffffff, 0x1f, 0x81, 0x6b, 0x6, 0x0, 0x100, 0xd2, 0x6, 0xffffffff, 0x8000]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000500)={"d1529b5e201b271adfbf10c4180ab5b0", r2, r3, {0x8, 0x1}, {0x9, 0x4}, 0x7, [0x6, 0x9, 0x1, 0x10000, 0x80, 0x21ceca64, 0x1f, 0x8, 0x6, 0xfffffffffffffffc, 0x1, 0x1, 0x3, 0x80000001, 0x80000001, 0x6]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c776664a867b7", @ANYRESHEX=r5, @ANYBLOB=',df=\x00\x00\x00\x00\x00', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) fremovexattr(r4, &(0x7f0000000000)=@random={'security.', '#}++-\x00'}) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 11:16:31 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5427, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5428, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 3004.158349] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:16:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0xfdfdffff}) 11:16:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5429, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:54 executing program 5: r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x20008, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {}, 0x2c, {[{@access_uid={'access', 0x3d, 0xffffffffffffffff}}, {@afid={'afid', 0x3d, 0x1}}], [{@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r3}}, {@appraise}, {@obj_type={'obj_type', 0x3d, '!'}}, {@obj_role}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@obj_type={'obj_type', 0x3d, '!@'}}]}}) pidfd_open(r0, 0x0) 11:16:54 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2a) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:54 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="2600000000000010"]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 11:16:54 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe30) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:54 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mmap$usbmon(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x7, 0x2010, 0xffffffffffffffff, 0x3) 11:16:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000480)={0x80, 0xd, &(0x7f0000000080)}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0xfffffdfd}) 11:16:54 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_io_uring_setup(0x454f, &(0x7f0000000340)={0x0, 0xd717, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000fef000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) readahead(r0, 0x80000000, 0x5) syz_io_uring_submit(r4, r3, &(0x7f0000000280)=@IORING_OP_TEE, 0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_CLOSE={0x13, 0x4}, 0x200) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2}, 0x1000) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r7 = timerfd_create(0x2, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000000240)="ba1bed15dce3c7272486783fa0060a0546b4c3b073b9bb52db0721ca479c1989ce13", 0x22, r5}, 0x68) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r6, 0x4, {0x0, r7}, 0x1, 0x0, 0x0, {0x0, r8, r10}}, 0x1) 11:16:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5432, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:55 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0xe) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:55 executing program 5: unshare(0x2a040600) unshare(0x0) unshare(0x80000400) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:16:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5428, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe51) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:55 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) fchmod(r0, 0x46) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCSIG(r4, 0x40045436, 0x21) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5435, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:16:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x7) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:16:55 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xc7, 0x2, 0xc3, 0x20, 0x0, 0x6, 0x600, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc985, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x2404, 0x3, 0xff, 0x7, 0x2, 0x9, 0x8, 0x0, 0x8, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r0, 0x7) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:16:55 executing program 5: unshare(0x2a040600) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0x81, 0xffffffff, 0xfffffffffffffe0d}) clone3(&(0x7f00000008c0)={0x11000400, 0x0, 0x0, 0x0, {0x200}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000100)='memory.swap.events\x00', &(0x7f0000000140)='memory.swap.events\x00', &(0x7f0000000180)='&)\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='*&\x00', &(0x7f0000000240)='}\x00'], &(0x7f0000000340)=[&(0x7f00000002c0)='memory.swap.events\x00', &(0x7f0000000300)='\v{[!(/\x89\'\x00'], 0x1800) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80000) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000940)={{r2}, "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"}) 11:16:55 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe5a) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:16:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200e02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 3028.210833] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:17:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5437, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:17:20 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES32=r4], 0xfdef) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TCSETSW2(r5, 0x402c542c, &(0x7f0000000200)={0x8, 0x9, 0x9, 0x8, 0x81, "c94bfebda5db22c479d9c45903e4e725d2b017", 0xf8000, 0x80000000}) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) r7 = syz_open_pts(r0, 0x4040) ioctl$FS_IOC_GETFLAGS(r7, 0x80086601, &(0x7f0000000100)) 11:17:20 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe5d) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:17:20 executing program 5: unshare(0x2a040600) 11:17:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:17:20 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:17:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:17:20 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe51) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 3052.107194] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:17:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe60) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:17:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:17:44 executing program 5: unshare(0x2a040600) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) unshare(0x20800) clone3(&(0x7f00000008c0)={0x1050400, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc4a, {r0}}, 0x58) 11:17:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0xb633}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000090}, 0x20048005) socket$netlink(0x10, 0x3, 0x15) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r8, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_COALESCE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x402, 0x70bd29, 0x25dfdbfe, {{}, {@void, @val={0x8, 0x3, r7}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4000002) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:17:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) r1 = syz_open_dev$usbmon(&(0x7f0000000040), 0x9, 0x735000) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000080)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:17:44 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000005e, 0xab30c6215d366b86, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0x0, 0x81}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20000000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:17:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:17:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5441, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:17:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:17:44 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = fork() ptrace(0x10, r0) ptrace$cont(0x7, r0, 0x0, 0x200000000000) ptrace$setsig(0x4203, r0, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB="8b16"]) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x3, 0x7f, 0x42, 0x1, 0x0, 0x6550, 0x48001, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x4, 0x6}, 0x100, 0x200800000000, 0x1, 0x7, 0x1, 0x7, 0x6, 0x0, 0x0, 0x0, 0x100000001}, r0, 0x7, r1, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:17:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5450, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:17:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x2, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x9}) ioctl$DVD_READ_STRUCT(0xffffffffffffffff, 0x5390, &(0x7f0000000080)=@manufact={0x4, 0x3, 0x800, "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"}) 11:17:44 executing program 5: unshare(0x2a040600) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x103040, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 11:17:44 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe63) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:17:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:17:44 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000040)={0x1, 'veth0_virt_wifi\x00', {}, 0x9}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:17:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5451, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 3077.653381] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:18:07 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000003}, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:18:07 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfdef) r0 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1, 0x7, &(0x7f0000001380)=[{&(0x7f00000000c0)="4959af4f3500a8c959703b0dcc0c4b3d68ef2917c01b65bc88bb86f21079c75555d4e67ebe4e07ed7f2fae52dbd0e59f4ed08b2bfc3eb7102b5370170b189ed0fdd005e74ff7ae43babd864566644f50ae182d4d22f273150e50f6c5837b43b7e23f8906c3dfb11b616202d378975e3713c68298557349428d4e2611f3b25d0b4fc05e601f989473e9b797a99a928bbdb3b14a404efb96454bc4b5d6e119366655d644c263b1cb27ab1528e109d130ec9ec7736f3a935b4d11214b70b1e057b7818919ad24fc5f3a46cdd82614109c98bcf360588ada2293e977f3c60fc8887aa82eb2ec4394464dffa80d2145b91f2442e5b8df9092f00c37473df27a0addc63f09daf46bdab43462ddb634669a9526d17952746837feadb1ba34b96538848105f0bac0e602a1e55ae9bf2e4cc4c7a2385826680ae22dda9e7d601f91ff478f7b08314b1c835bbc8fa08037b3991524ac63302e7dc1c07515d106a2a02c6870182ddcc68f71cb8abeaa26fa0dbca4a91e6ea7963bb62d7a402630c2fd5e1c38086e9b86354056f8025dac86259ab2f11b92dd0bda9af32bbf80bd73ef9a6951a7801cc281a33458c9f1866b884e16245f31cfc34286ca5c9735c4c6763d42c4cf2d8878804abba16ec9ae6f982a83406acdb413e80ec4302b519e4d41ff05b0c96ad20655e989f5860b7340457d48f62e90fc157671f727e5c242115f6a54550042e01211654303851a70f5ee7d9f4c3ccde59114a84aa3ea09aa606c1b597527913c7785a8d530efcdcca2673a1bfe28f06c28f2ac4c1039bea946d10153590e6d080c9ce67f42bbd97d23e296ee8a2e9cfecea990e23431924b87440af35f7e5bb3662e268a19e550dfd2aeeb6ad05f42449ce2f52d5345449c3673d411f97d04ed66e443a3ada9ef790b93e2fe6a09949a97c4ec51824c7274b89fc46bb0c220792d0388ddaee946c623d73feb186ad4ce3eb4f4b842a8c0b609e7cc06f964e83892a2f4a12cbe99093c5dd574558a52c6ddebc98d48ef95dba221f635d301c82dd4ab7c82ade8c2fa38dfcdbdb86114aa2001eb2ed4b93be155597ce49ecc735360c74198a23d0ea44be38f57f21d74b11aa56db25424d08a22d6463420d6557a098e74e39170c330be7108b3156987eac652a83bbfa7e393db6bf0b4c42ddbddafbc39fa4cb846e0eefff126963fc74d999f8df2b68af9ccf82dc05c2d9409916aa85dc44412e8c7b121d930c5d8d0d01c9d2dd33cd41a0a440a336d6fc019022b9f83da883d0472e9fb3b774a52a46df749121d412a0a0e0a0bdb7279723ae0b61a20a9e022cca92851b4e91714f24ef7efc3fef27fefe8674f3faf0345469b5daf807f76eccebac4c68b7624670b7f7448d06ee252ee5c069a790e7cc426d8fb1e42c18fa69b1b013dd4e75065dfd4086e9fa8422ea636e9d2481e64397dd62cc43543f8c53fa76aa36fa044d09b3696e6929d2fd701d41b882554261fa5ec3164610e211dd340234d59879fed8a68631853a50fe20e1071bd77b97c803b8d3fb0db9dc2ca1b23d959b4e6e3552af15320b460e00ffa583f58534726d91fd95ffee29178d1fbeeba76cc0d98fb799aa512f200af4ebc4833cc7a4e5756144855c4725dc309a0bc727e263196602d41f5d8ec941446e74a44ea4e9585b85ab00addc855d91ba82df1a0f965a11671088946fd55da736e53ee3245136773c7587c1d79dde4425ec19753ba100e458ae37d52ddd4c4ba89052e99d884f329547264b7ec7d18d1ccfaefe998e417115ebd9de86fc40d011b53bac5a884aa71de0cd7904b4d9189f4c90d28bd61883807bc8a217c78ecb87c488e36a969042d082ed88a88be5bc9e03d32f0fc7adf79e583d7faf1aafdb6f9766219832c88671b5e14df9a008ed2dc46ef3f7a2f1a902a5c8f2bdeaf57feab707d553e52b356a88bb894b9569deeb3463bcfaf46649a8a3a7fccb136b6495c1ec400aaede3ed75832919f68470737e7aba3c8090b8df40db9bfd003105a69d7c286233eb5f723ddcfe2fd3394c5a27d54a3610e5d44d06f44f98d07fe0d2e7a05bb1fd27faaaa7dbb0e60b4267c33b1f75c8630aec3843e3f6aaf1b6b2fe4da3cccac029d12848b582012c6511c92d7200691023d798964bbb76d52da822e0d605cb5b125751f115d8bd9250e7daab44a56eaec0989cbfd5fb9b8f3dcc80725b194dd7c1a6cfd4646b0ba0f365bb73400f1aacced010ac7d77a8f96a114a25e7d8abfe793f0551e1a11abc815199d1fab43701d492673b23ccb487dd2e3408c619385edf6898675620c46fd67597a51514ecf682224e8c3e714b32e82e9fc2cfce6124d6660a87bc9fe0dad3548a8a806b1e874adb6d56d89c7cbf05667f83f03731f5fd10f36d808b769bc2fc20ca77d6dc491740896391fdb28fb34847b3662e9e7d37bef42665f331294850dbc1a11628be952273454deea3e6bb91230b6eecef17bb61008099a86807b4bf53bbbf22f2fc5789fe6a3e8e6f9541acf914725d4ffe96db3248a02984ccae48504fd177ff31fc29c85a7a5cd5136dc4552e9a76ea82163360f53cf3757973802b4209aed35ee60630b251b749df65adefc0a1d9e79fa0f7248310346326113cde4415d07190168b9dc2efc910deca826ced8cc05cbcab45707313b41801186623fd16efd799e7176f54f2789c3d5b8ff2e0344cbd56fbb02b7d65c9fa098eb20fddf5bfcbdc03504c8d5fb7908bd7894d01ec99ee4b0fb1f7cc6bb8377c4dd743c67330b261108e3b4ffcab6a26f3c0a79047cc142efc6de9141c25b6092da1fc8eef36dee4e2d2492ea631a568e092adf986a2c115a18398f76e67e427572e109ec6aa6d80cf9aa1dc1b97a89a0c5b5dcfe32256dd5bcac7db686d61a8e29bd3ce5ea96e34d3e3e1269838f903ac802ff1ab8374272ba6d1a40b6167187b30ff75a362daf56e4e7644ebe6e42b2b71cece0ed36ffd300f4fe63552e4aff12edb62c00bea0a76398d703f870991ce331db549e02c84e7687cb29bad5b61c6a42eb192fb6e1d554805466fae4456ce99d87f1763c69840b6ecd4c0fd188fa2160233ef4ef98b260c5da8f40ec2641bd8d7f6b5a0be451b08a12d2f797311dc705b48b5249bc3dd77ed1b981f4014ab81df0adfab8e91caa8f59270c11b419c8a66bda534c397514bf9288667589f37cc64cb5c505ab54bed5905cd870b78bd6a1c2d64a42a0bf10fd97193ea26e98ed6b200d6f8a06a91c207226892326a962c25d4a6bf6b6d1ee42d58d81bfd14f12a4f3afdfc26a5f3c70a4619ca6242548842d108d3420a499feb1e92ae4823a99e3c6d62937995566fcf0fed54ee99eb7e2d8ef001cfc7872e798d74a4e8255bea424ebf0f0980e5a8822e99c354b7d91f83ef2c481228adb0c2f70e70c0c8251bd3c8287d7d8450b53d423ae528b7d7f9dbe12eebc2ad9f70683d8b09dc7d3d91d6a40dd6ee9a834b8f6ddd5734d3a1f91cedc72731d5d0b8cb91f640583d94495ee70812e047084eeb01d0b120587acf7ff5f9b64575a939fde70a0cfe76d08e6a9b0a628abe487cc85ef18071e65146a9598b282c5e05977ab9bc5e12e2010a6b09c753f03abde8db442aca6773c1d29c2531885ab0f8cc1204ced2b8252b3ebd6da1baee68da07f94a7e8f242bb5edb83f71dbe109783df6b077be3342d40281c874cae9e38de2965a8577d69f51b93d0218cf144830f84beba695effaf4484e10b046df2b914e0ae2fbd54dcac12fb9a0f72d44dc64c7ce1a6793c7013809112e72a16f3dcf7e55cd5876893bf82491762a0272ecd3c7fa29281e115329a5c8eab59ee9f2bcee569e906fb9cdac19f397b0f7e164d310bccef5e7e80307bfae65cef3ab183d4d6b663e52a11ee2c3faf0e3772f358f0e955ab01407eff2524f9659c04e852b950ebde4239ca08dd3c15aea03eeb1caa525bc6cb3e58dbe293d5ffa496e4766a7c4aa323070ee535c53212d6317ceb1ab0374646ade13f4a0dd7cd1bf1a2459ed5f82c5e91354b092fb63a164523fb4d32f7fb2d62e5cf81ab9158fcc902cf6d242c4378336f0adf02fe66d9ed6daf367542945ab61657603ba13fbb939a50a381ab47dd90086271a1df4d01cb3fd0fbfa6e3fdf9e93ef5106ab69d1ed338a46e0ee8e5c9d51b897adb1902b4abb9dcbb9de77ca09a32da3492f30aa398c85ba2d7e77d17b7fcd25633b8ec85667021357cca42799515b8ee67b2a7b977c60c553f55924a9fc2238baedbaee01c59c900447ad7fe1ac63ab58b226d61fb7febcc50cf40d8cbdee8ce347d821b6dedf694d399c7c1a1da326478ce30d89e71fc59130214a1878787da1604872b1f3f003138baea8b6e0537b1445b330daa1f1c9cacd32585c359e37396d6321635c35e56d46a8fc460e4e31b2d06c52b239abc7c32200023bc80a2a173443ebc2a96c3718bff23496537fa19faf73a5dd894c2ceab7ef4ac1f22381229eb9b556a31721d3ce88736ff2cc4e587beafbf848d050909257222249f2cad4fdb927e274b759a1f86a7180caa1d0b434fe4eb98399c7215225f5340ecec1737abc31eecc8c1a78d7e7d6c12ac452067e4ffcbb0f7bf2b1778a090445644718f5ee0ec96dc8edb70a6e9594bd7cc34ba207d1e1debd81ecd9df1603a13ebcc2cb625df4dcf47e6f579ed512cf584b1b8ea1c6b0e29dc4c326309808e4df325fb28c5113c7282b82808e9fda58f463540e4f732435c8c6c97760d8caa51c831a227d26243392eb1f75de72d74b5ac320aef96819c60596c13b98d2b65edb7a4751709b4dded40e1399fd4e5b17aa9df016d8eac04903d871cbe309338b9944e3a275a512c893fc64210e9d3c013c3158efaaab679c31fd19f02d29b8bb0bec048292302fe38613489bbfba17e1cbae5c2dfa723ab1e1eb85f5609dd08b99b4df1b0edbac58ba0f09c5acec0b8b6f0a62a3364fcc3f601db5b0b577ef23ac662153800b3c9c0b7650e157189ce3966ae282d7cb3243a4a9dc35570be75d552a84ebcd528d8faa775064a3e8b9214487ebf365abda8a8711ece7290a54dfe4cb86aa46f82dc2f5f591775dc9e95473c5ad8a3e23dd849c8c20ebb5388c0c81af411efc5148c0d5cd0e76e752753e40754540f88cee22e057e813735b30c5d83e1b08d0b046f92f52c06db7a2f0597513073a6efa826d94753e44e415c6d3855bfe48899adeb05c2754206499e996f6bd8a96e3504714825ec9a6895ac2da38759ebc110df7ad719f33b2ec7327f6ecbebc60e55469dbbb5945589dfb82121be2d29009cd1b96e90a9b782a06f1503d395452b0ec64e885a4c6f9107ede2f1c91991c688cf2e35133dc4e34157abb71f4e21c5f78440cecac08b81379529fbe6b689bbaca4ff9ad569236a6e7c6993e096f732a76d62746dbd97659d7e787e2b8029835446866950ff9c4cdfa252931fb49c6970207a9b5a77d1b70620f4dab9ccb9b98f781967243868f7159e608cfdd4148e0de3ff652b2a6ed8cfaf3b3eb1330b79efd69d2a14fbf86e8961a9910e3ccbccf81a2e4bde2890105c097df8bd4d5839b82c1aa892705cce4be6ebb36e96a4dcbbdd0977715aeb4f93f3ef62a10d007bd1783d9ffa1d4982960962d9d692498242ad40d3442dadc9592c1f37134003d0c33233dd9dee332a6f9032ca01bf9bb7ada062f7f6ac67e716d829aa510ebc9f7d3a4f8e4f9d5c5864c800a50658133c7c02924d07b340967ecc076977687744c7f6bda203537c8622b6b2e3e0a89631df57c21d5235", 0x1000, 0x7638}, {&(0x7f00000010c0)="6df902650a1765255635682556b38e7f183d8745ac0af4cad2dd19f635ec9c1c39e13101698c4341d5595b89e1f9366db4b36404e88ed9b68a73b3344b91e9b7e6dda6da3175ac6461c384bd716a6536987f0f48e36e8914d760f64978e13b4fd5498da5f69e6caef150b95396f13a779175e36aa12baf570baf06a77f8569f048ea664858c96077e6d8f7b7f51d894ab4a7431e7b547f36a267e5ba861f5586b13f36ff4a0827f85fc3716786e7f379e90c7b30823d7586dcc9888ae548346498a6246c39b3b186b0489482fa7cf1a4ee83757ae905f104926c88fff21a241cf6daac4142e107c9fd3bd255", 0xec, 0xff}, {&(0x7f00000011c0)="dc5c3e43d7701109a9320299c553c70ab7619c5e790a9926fd56ab3bf6534ed59b1f530747ff81b71c3c5dad4d50c5098f4b4c7589fd6717fae3215d08abf28ceac4d96ad04012129da5da6c4e89ce2853fc561f1e54492c7d", 0x59, 0x200}, {&(0x7f0000001240)="2bdce0ef05e7f4beabbc01cf0ee52f4d2c66", 0x12, 0x5}, {&(0x7f0000001280)="c970a40577ada48da3cc09860d4f81b391f89a1cd398404db798acdbbc0e934cf0ad1691b7319810b325892ac26e0d5fe7debb3f16eadee1df3376228552186fb4fd1e5e8f5a6431755781bfbfc09f1f94919eeb8c50885b728f37", 0x5b, 0xfffffffffffffff8}, {&(0x7f0000001300)="7e588846a57612e9a283764d69e28d7e92c46b9bfb666b", 0x17, 0xff}, {&(0x7f0000001340)="d9ee0c3b33e9354e13590f3affbe414f616a834bec710dd82fadc156d365", 0x1e, 0x7}], 0x2000000, &(0x7f0000001440)={[{@fat=@debug}, {@nodots}, {@nodots}, {@nodots}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@subj_role={'subj_role', 0x3d, ']\xfb@$'}}, {@uid_gt}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}, {@obj_type}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x63, 0x61, 0x31, 0x63, 0x35, 0x33, 0x36], 0x2d, [0x66, 0x34, 0x62, 0x65], 0x2d, [0x37, 0x66, 0x36, 0x61], 0x2d, [0x62, 0x36, 0x37, 0x39], 0x2d, [0x66, 0x35, 0x65, 0x64, 0x34, 0x36, 0x37, 0x30]}}}]}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000001500)) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000040)={0x0, 0x4, 0x0, 0x0, 0x4, "6f3c4f472eee000000000000000700"}) 11:18:07 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setregid(0x0, r4) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000010001000000000002000200", @ANYRES32=0xee00, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="040002000000000008000000", @ANYRES32=0xee00, @ANYBLOB="08000400", @ANYRES32=r4, @ANYBLOB="10000400000000002000040000000000"], 0x5c, 0x2) unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:18:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCXONC(r0, 0x540a, 0x3) 11:18:07 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe66) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:18:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)=0x1) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) 11:18:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5452, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:18:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x511802, 0x0) pipe(&(0x7f0000003140)={0xffffffffffffffff, 0xffffffffffffffff}) clone3(&(0x7f0000001400)={0x82000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0), {0x30}, &(0x7f0000000300)=""/187, 0xbb, &(0x7f00000003c0)=""/4096, &(0x7f00000013c0)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x8, {r1}}, 0x58) r4 = eventfd2(0x40, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000002080)={{r4}, r5, 0x2, @inherit={0x50, &(0x7f0000003080)=ANY=[@ANYBLOB="0000000000000000010000000000000005200000000000000000000000000000220000197a1645eda279e7c4b6fff0ec00000000000000000000000000ffff89ff7f000000007f0000000000000006000000000000000900000000000000"]}, @devid}) r6 = signalfd(0xffffffffffffffff, 0x0, 0x0) r7 = timerfd_create(0x2, 0x80800) r8 = eventfd2(0x40, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000140)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f0000000000)=r9) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r6, 0x84009422, &(0x7f0000000400)={0x0, 0x0, {}, {}, {0x0, @struct, 0x0}}) ioctl$BTRFS_IOC_RM_DEV_V2(r7, 0x5000943a, &(0x7f0000002080)={{r8}, r9, 0x2, @inherit={0x50, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000100000000000000050000000000000000000000000000002200000000000000660c000000000000ffffff7f000000007f00001d0000000006b6b3b14f00"/80]}, @devid=r10}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000001500)={{r2}, r5, 0xc, @inherit={0x78, &(0x7f0000001480)={0x0, 0x6, 0x0, 0x20, {0x10, 0x40, 0x40, 0x366, 0x4}, [0x20, 0x9, 0x8, 0x0, 0x5, 0x1000]}}, @devid=r10}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) write(r1, &(0x7f0000000200)="1a98ef1566ae70e69c002e0f4b44882bf7a19d1af6b1cf0fca9eadedce9e578b6d1f0026f7ce8d689aa1c717e3ec73e20ea9b9b7e0fd27a36f9f17f593f392a460742eb0b7f0ef77392337b222f2a62005fb24fb6a69ea9b27071e628e4f9ea9d19b764f429f69bac27acdddd7c1d5679cb92908ae373fde42e7a63101", 0x7d) r11 = dup(r0) write$binfmt_elf64(r11, &(0x7f0000000100)=ANY=[@ANYRES64], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) [ 3085.781062] FAT-fs (loop4): Unrecognized mount option "func=MMAP_CHECK" or missing value 11:18:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 11:18:07 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000000)=0xef22, 0x3, 0x1) 11:18:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5456, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:18:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x1f, 0x3, 0x3}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x8, 0x0, &(0x7f0000000080)=[@increfs={0x40046304, 0x3}], 0xf5, 0x0, &(0x7f00000000c0)="ebb7d01fb5534974cbd0941eed8c923197c973b08a23de6288ebcbdc18989b6d2de7b71c20d895fbb22c287582dec99d03104bd9f5fc6fc924ae936d50ca692b4355afc51026d407dfc8c3d23259fd3183bde1053b7004248f59736c4a71528fcf5f4694ddd5abd50c782af58945ad0161b56e6f6004668b3dd7bf5bdbc675370fe59d5040ca88d411027a390ddb02248d7f2c34bea6eeefd9080951ecee18a315c9c3600fc9027297ae97f35f12b84f2eedbe6d4dd5385c09732a020aa58a912217c7d59bbeabb5204a39827b7ecc6c741468bca11b0b855bc27f336fbd8706fb73d9ef69c84e39149a7c45306b1c99ff003f0891"}) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:18:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) ioctl$TCXONC(r1, 0x540a, 0x3) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)=0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, '\x00', [{0x81c3, 0x17, 0x8001, 0x1, 0x4, 0x2ca218d2}, {0x7fff, 0x9, 0x3465000000, 0x3, 0x2, 0x9}], ['\x00', '\x00', '\x00']}) 11:18:08 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe87) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:18:08 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x20000200) 11:18:08 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 11:18:08 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 11:18:08 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_elf64(r0, 0x0, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x88100) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f00000004c0)={0x79, 0x1b, &(0x7f00000000c0)}) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r4 = syz_open_pts(r2, 0x40) socket$netlink(0x10, 0x3, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$VT_ACTIVATE(r6, 0x5606, 0xffffffffffffffe0) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000040)={0x204c, 0x6, 0x1, 0x100, 0x5, "4b7153dc1fafbb8bc3a8d7ed253bb5e27fd7e8"}) 11:18:08 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0xee01, 0xee00}}, './file0\x00'}) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000140)={0x8, 0x80, 0x800, 0x6, 0x6, "471f06b7ccb2b3dfb63a6378316d68dad99627", 0x1, 0x3}) r2 = eventfd(0xf6) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001740)) 11:18:08 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 11:18:08 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$netlink(0x10, 0x3, 0x15) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="01000000080000", @ANYRESHEX=r3, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f00000001c0)=""/40) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x94, 0x1, 0x7, 0x101, 0x0, 0x0, {0x2, 0x0, 0x5}, [@NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xffff}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x3c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x6}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3ff}, @NFACCT_FILTER_MASK={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x80}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}]}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x6}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0xc0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:18:08 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe90) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:18:08 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x9, 0x9, 0x2) 11:18:08 executing program 3: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 11:18:08 executing program 4: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000180)={0x12, 0x6, 0x1, "dec32478dcb012f4af3565645b57ece3629f"}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000) r2 = open_tree(r1, &(0x7f0000000100)='./file0\x00', 0x80000) openat(r2, &(0x7f0000000140)='./file0\x00', 0x802, 0x1a1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f00000000c0)=0x3f) 11:18:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_freezer_state(r1, &(0x7f0000000200), 0x2, 0x0) fallocate(r3, 0x44, 0x7, 0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x1, 0x8, 0x401, 0x0, 0x0, {0xa, 0x0, 0x3}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0x401}]}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xf5}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @icmp}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x200080d0}, 0x1) [ 3102.119420] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:18:32 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000500)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r2, &(0x7f0000000140)=ANY=[], 0xfdef) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f00000004c0)={0x1, 0x100005, 0xa, 0x1a, 0x1f8, &(0x7f00000000c0)}) 11:18:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5457, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:18:32 executing program 5: unshare(0x2a040600) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x3dd802) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x4) 11:18:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) 11:18:32 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) 11:18:32 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe93) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:18:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 11:18:32 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 11:18:32 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:18:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 11:18:32 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe87) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 3125.618032] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:18:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x545d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:18:57 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x3, 0x4, 0x80, 0x7, 0x1a, "159bd7df12d4a838848af2c8da0adeedc8dc13"}) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"596f4bada284887b59b65200cb1f37a2", 0x0, 0x0, {0xbb66, 0x5}, {0xf9e7, 0x30beeddb}, 0x3, [0x100000001, 0x6, 0x2, 0x3f, 0x8020, 0x1, 0x9, 0x7f, 0x7f, 0x5, 0x1, 0x80000001, 0x26, 0x297, 0xffff, 0x8001]}) ioctl$TCXONC(r0, 0x540a, 0x3) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:18:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x5134}}, './file0\x00'}) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0)={0x1, 0x8b}, 0x2) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:18:57 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x2000008, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:18:57 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe96) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:18:57 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xfc, r0, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xa3b}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2e}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x38}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x23}}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010100}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xc808}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20040800}, 0x200408c1) unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:18:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0xc02, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 11:18:57 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe66) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:18:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 11:18:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x482000, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:18:57 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:18:57 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 11:18:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x5460, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) [ 3150.872820] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:19:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:19:21 executing program 5: unshare(0x2a040600) unshare(0x100) unshare(0x0) clone3(&(0x7f00000008c0)={0x1081100, 0x0, 0x0, 0x0, {0xc}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:19:21 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) r1 = socket$netlink(0x10, 0x3, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000040), &(0x7f0000000080)=@v3={0x3000000, [{0x4, 0x1}, {0xc54e, 0xfff}], r4}, 0x18, 0x2) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) dup3(r5, r1, 0x80000) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) clone3(&(0x7f0000000340)={0x2216480, &(0x7f0000000100), &(0x7f0000000200)=0x0, &(0x7f0000000240), {0x1d}, &(0x7f0000000280)=""/16, 0x10, &(0x7f00000002c0)=""/34, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3, {r2}}, 0x58) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000003c0)={0x0, r7}) 11:19:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 11:19:21 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe60) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:19:21 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe99) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:19:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x3, 0x2, 0x40000000, 0x0, "6f9081bb5729000000000000000000000400"}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x3, 0x40, 0x46}) 11:19:21 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:19:21 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:19:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x19) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000080)={0xfffffffe, 0x8, 0xa, 0x55f10035, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x3b, 0x40000}) 11:19:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) 11:19:21 executing program 5: unshare(0x22060a00) clone3(&(0x7f00000008c0)={0x243060700, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:19:21 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe60) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:19:21 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe9c) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:19:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40045436, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:19:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) [ 3173.136535] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:19:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xebd) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:19:45 executing program 5: unshare(0x2a040600) unshare(0x40040000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) openat(r0, &(0x7f0000000000)='./file0\x00', 0x840, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:19:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCXONC(r0, 0x540a, 0x3) socket$netlink(0x10, 0x3, 0x15) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:19:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:19:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x10000, 0xfffffffd, 0x0, 0x0, 0x3, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x40}) 11:19:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:19:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40049409, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:19:45 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) move_pages(r0, 0xa, &(0x7f0000000080)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000fee000/0x4000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil], &(0x7f0000000100)=[0x4], &(0x7f0000000140)=[0x0, 0x0], 0x3) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:19:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:19:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:19:45 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x6, 0x7ff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0xd) 11:19:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40086602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:19:45 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)=0x1) r1 = socket$netlink(0x10, 0x3, 0x15) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)={0x0, r1, 0x80000001, 0x3, 0x8, 0x8000}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c64666c747569643d39aee558367294fd7b36001215ce1f23eeaaa8a367018a9583ee0db89c50089267da64db5f13ba8fb2cabecdd2e72fad5f37325efea535559839aa025dde", @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) ioctl$TCXONC(r3, 0x540a, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 11:19:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000240)={0x1, 0x2, 0x1000, 0x6a, &(0x7f0000000100)="38f5e0dac80dedd877997860e51c1dfc7832f057dd417803584ab2f5d500171688abb892a0913309596dead906ad9d37777ea5cec64284682b0bf877a00e2291b4bcaabd7325a11c7e54f2b8c5861fee1d579b08f57da9295e3f9de6e1d845f084d867ff32f04aff1bf6", 0xb6, 0x0, &(0x7f0000000180)="987d5dfc747e95b21075d535436ac8010773a996ecf7f725e1f84946dd38971bfdd11a7b9382101106a2f2fdd88d956ccb04b2cd2386cd9041823427627013fbbf2529ea12a447da9745ba12cc114df7a5ee06908e8b05817daab0538d22b90ccfcf64f2dbd3179dd0edb66649417e3d3186b2a5f43a375ca9f7f86ad2e4a53396e8eae5f7d4522612b0e3904e4797177a5e9c835732b0ea744e187630e688497e957e4176916ccbc424aab14b6e4d332275fbb8d9f2"}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000000c0)) 11:19:45 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xec6) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) [ 3199.585559] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:20:10 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xec9) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:20:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 11:20:10 executing program 6: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x4000, &(0x7f0000000000)=0x6, 0x7ff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) madvise(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0xd) 11:20:10 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0x4, 0xcafc, 0x7) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:20:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:20:10 executing program 5: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x8060000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x6, 0xffffffffffffff01) 11:20:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x40087602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:20:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000001000000180000007b93dcdda31911da2a186cdd4443e951f14cb3528571ab02ccf2839f0cfca99834c439a75dcdfa47891c1d8ffb13ee982e8340fb9908726e8ed059e59c9d03e66ef25ed86e97ded55d457c8bd0bbb8b7cd719c2c68fc8f3166113b86dad66217d56a1b57b2386feac0d1aceef9f4bccbab1f7acab7", @ANYRES32=r0, @ANYBLOB="050000001bd600002e2f66696c653000"]) readv(r1, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/10, 0xa}, {&(0x7f00000001c0)=""/28, 0x1c}, {&(0x7f0000000200)=""/171, 0xab}, {&(0x7f00000002c0)=""/112, 0x70}], 0x6) 11:20:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:20:10 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) mlock2(&(0x7f0000feb000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:20:10 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xec6) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:20:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x4020940d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:20:10 executing program 6: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) move_pages(r0, 0xa, &(0x7f0000000080)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000fee000/0x4000)=nil, &(0x7f0000ff2000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil], &(0x7f0000000100)=[0x4], &(0x7f0000000140)=[0x0, 0x0], 0x3) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:20:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:20:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c018000007569643d", @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000280)) write$binfmt_elf64(r3, &(0x7f0000000200)=ANY=[@ANYRESDEC=r0, @ANYRES16=r4, @ANYRES64=r0, @ANYRES64=r1, @ANYRESDEC=r0, @ANYRESDEC=r5], 0xfdef) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc101) ioctl$TCSETSW2(r7, 0x402c542c, &(0x7f0000000040)={0x0, 0x100000, 0x0, 0x0, 0x0, 'o\x00\x00\x00\x00\x00\x00\x00\v\x00'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) r10 = fork() ptrace(0x10, r10) ptrace$cont(0x7, r10, 0x0, 0x200000000000) ptrace$setsig(0x4203, r10, 0x3, &(0x7f00000000c0)={0x40, 0xb6, 0xa73}) ioctl$TIOCSPGRP(r9, 0x5410, &(0x7f00000000c0)=r10) [ 3221.776833] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 11:20:38 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x81, 0x1, 0x1, 0x6, 0x0, 0x8, 0xa006, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80, 0x7, @perf_bp={&(0x7f00000000c0), 0x1}, 0x40000, 0x1, 0x3, 0x5, 0x7fffffff, 0x2, 0x1982, 0x0, 0x0, 0x0, 0x86d}, 0xffffffffffffffff, 0xb, r0, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x30, 0x6, 0x3, 0x5, 0x0, 0x1000, 0x400, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x8, 0xffff, 0x5, 0x6, 0x7, 0x6, 0x3, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x5, r1, 0x0) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:20:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file0\x00'}) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000000c0)=0x6) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:20:38 executing program 6: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:20:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:20:38 executing program 5: ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) unshare(0x2a040600) unshare(0x0) unshare(0x800) clone3(&(0x7f00000000c0)={0xc1018700, 0x0, 0x0, 0x0, {0x80000006}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:20:38 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xecc) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:20:38 executing program 3: unshare(0x2a040600) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) unshare(0x8060000) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x6, 0xffffffffffffff01) 11:20:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:20:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0xcea, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729", 0x0, 0x4}) 11:20:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) 11:20:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:20:38 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x2000009, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:20:38 executing program 3: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x21c}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:20:38 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) (fail_nth: 1) 11:20:38 executing program 0: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r2) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, r2) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x300000d, r2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xecf) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, r2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) 11:20:38 executing program 5: unshare(0x2a040600) clone3(&(0x7f0000000000)={0x140000800, 0x0, 0x0, 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:20:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000080)={0x0, 0x5, 0x4, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:20:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0xb4) [ 3236.359746] FAULT_INJECTION: forcing a failure. [ 3236.359746] name failslab, interval 1, probability 0, space 0, times 0 [ 3236.364006] CPU: 1 PID: 18661 Comm: syz-executor.6 Not tainted 5.10.162 #1 [ 3236.365399] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3236.367087] Call Trace: [ 3236.367646] dump_stack+0x107/0x167 [ 3236.368410] should_fail.cold+0x5/0xa [ 3236.369189] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3236.370253] ? tty_buffer_alloc+0x243/0x2b0 [ 3236.371135] should_failslab+0x5/0x20 [ 3236.371923] __kmalloc+0x72/0x3f0 [ 3236.372640] tty_buffer_alloc+0x243/0x2b0 [ 3236.373481] __tty_buffer_request_room+0x156/0x2a0 [ 3236.374484] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 3236.375628] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 3236.376822] pty_write+0xe6/0x110 [ 3236.377525] tty_send_xchar+0x29b/0x3c0 [ 3236.378336] ? tty_write_message+0x140/0x140 [ 3236.379231] n_tty_ioctl_helper+0x191/0x3a0 [ 3236.380121] n_tty_ioctl+0x56/0x370 [ 3236.380862] tty_ioctl+0x912/0x18b0 [ 3236.381602] ? n_tty_write_wakeup+0x40/0x40 [ 3236.382476] ? tty_fasync+0x390/0x390 [ 3236.383249] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 3236.384441] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 3236.385483] ? do_vfs_ioctl+0x283/0x10d0 [ 3236.386312] ? selinux_inode_getsecctx+0x90/0x90 [ 3236.387282] ? generic_block_fiemap+0x60/0x60 [ 3236.388194] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3236.389184] ? selinux_file_ioctl+0xb1/0x260 [ 3236.390075] ? tty_fasync+0x390/0x390 [ 3236.390843] __x64_sys_ioctl+0x19a/0x210 [ 3236.391682] do_syscall_64+0x33/0x40 [ 3236.392438] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3236.393471] RIP: 0033:0x7f196036eb19 [ 3236.394229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3236.397962] RSP: 002b:00007f195d8e4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3236.399519] RAX: ffffffffffffffda RBX: 00007f1960481f60 RCX: 00007f196036eb19 [ 3236.400962] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 3236.402404] RBP: 00007f195d8e41d0 R08: 0000000000000000 R09: 0000000000000000 [ 3236.403855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3236.405300] R13: 00007ffd04517acf R14: 00007f195d8e4300 R15: 0000000000022000 [ 3236.406782] [ 3236.406790] ====================================================== [ 3236.406798] WARNING: possible circular locking dependency detected [ 3236.406803] 5.10.162 #1 Not tainted [ 3236.406810] ------------------------------------------------------ [ 3236.406816] syz-executor.6/18661 is trying to acquire lock: [ 3236.406822] ffffffff84f0c480 (console_owner){-...}-{0:0}, at: console_unlock+0x2e1/0xb40 [ 3236.406844] [ 3236.406849] but task is already holding lock: [ 3236.406854] ffff888019cc1158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 3236.406876] [ 3236.406882] which lock already depends on the new lock. [ 3236.406884] [ 3236.406887] [ 3236.406894] the existing dependency chain (in reverse order) is: [ 3236.406896] [ 3236.406899] -> #2 (&port->lock){-.-.}-{2:2}: [ 3236.406919] _raw_spin_lock_irqsave+0x36/0x60 [ 3236.406925] tty_port_tty_get+0x1f/0x100 [ 3236.406930] tty_port_default_wakeup+0x11/0x40 [ 3236.406936] serial8250_tx_chars+0x51f/0xb00 [ 3236.406941] serial8250_start_tx+0x695/0xa60 [ 3236.406947] __uart_start.isra.0+0x17c/0x1c0 [ 3236.406952] uart_write+0x2f2/0x580 [ 3236.406957] do_output_char+0x5e8/0x870 [ 3236.406962] n_tty_write+0x4c9/0xfe0 [ 3236.406968] file_tty_write.constprop.0+0x529/0x910 [ 3236.406973] redirected_tty_write+0xa5/0xd0 [ 3236.406979] do_iter_readv_writev+0x476/0x750 [ 3236.406984] do_iter_write+0x191/0x670 [ 3236.406989] vfs_writev+0x1ae/0x5e0 [ 3236.406993] do_writev+0x139/0x300 [ 3236.406998] do_syscall_64+0x33/0x40 [ 3236.407004] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3236.407007] [ 3236.407010] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 3236.407030] _raw_spin_lock_irqsave+0x36/0x60 [ 3236.407036] serial8250_console_write+0x9f5/0xc60 [ 3236.407041] console_unlock+0x82a/0xb40 [ 3236.407046] register_console+0x53d/0x800 [ 3236.407052] univ8250_console_init+0x3a/0x4a [ 3236.407057] console_init+0x361/0x4fa [ 3236.407062] start_kernel+0x2e1/0x48e [ 3236.407068] secondary_startup_64_no_verify+0xc2/0xcb [ 3236.407070] [ 3236.407074] -> #0 (console_owner){-...}-{0:0}: [ 3236.407093] __lock_acquire+0x29e7/0x5b00 [ 3236.407098] lock_acquire+0x197/0x490 [ 3236.407103] console_unlock+0x360/0xb40 [ 3236.407108] vprintk_emit+0x1de/0x4d0 [ 3236.407113] vprintk_func+0x8b/0x140 [ 3236.407118] printk+0xba/0xf1 [ 3236.407123] should_fail+0x47a/0x5a0 [ 3236.407128] should_failslab+0x5/0x20 [ 3236.407132] __kmalloc+0x72/0x3f0 [ 3236.407137] tty_buffer_alloc+0x243/0x2b0 [ 3236.407143] __tty_buffer_request_room+0x156/0x2a0 [ 3236.407150] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 3236.407157] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 3236.407161] pty_write+0xe6/0x110 [ 3236.407166] tty_send_xchar+0x29b/0x3c0 [ 3236.407172] n_tty_ioctl_helper+0x191/0x3a0 [ 3236.407177] n_tty_ioctl+0x56/0x370 [ 3236.407181] tty_ioctl+0x912/0x18b0 [ 3236.407187] __x64_sys_ioctl+0x19a/0x210 [ 3236.407191] do_syscall_64+0x33/0x40 [ 3236.407198] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3236.407200] [ 3236.407206] other info that might help us debug this: [ 3236.407208] [ 3236.407212] Chain exists of: [ 3236.407215] console_owner --> &port_lock_key --> &port->lock [ 3236.407240] [ 3236.407245] Possible unsafe locking scenario: [ 3236.407247] [ 3236.407253] CPU0 CPU1 [ 3236.407258] ---- ---- [ 3236.407261] lock(&port->lock); [ 3236.407274] lock(&port_lock_key); [ 3236.407286] lock(&port->lock); [ 3236.407297] lock(console_owner); [ 3236.407307] [ 3236.407311] *** DEADLOCK *** [ 3236.407313] [ 3236.407318] 5 locks held by syz-executor.6/18661: [ 3236.407322] #0: ffff888042c78098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x90 [ 3236.407346] #1: ffff888042c78130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: tty_send_xchar+0x1e2/0x3c0 [ 3236.407371] #2: ffff888042c782e8 (&tty->termios_rwsem){++++}-{3:3}, at: tty_send_xchar+0x22f/0x3c0 [ 3236.407403] #3: ffff888019cc1158 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 3236.407429] #4: ffffffff84fec800 (console_lock){+.+.}-{0:0}, at: vprintk_func+0x8b/0x140 [ 3236.407453] [ 3236.407457] stack backtrace: [ 3236.407464] CPU: 1 PID: 18661 Comm: syz-executor.6 Not tainted 5.10.162 #1 [ 3236.407473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3236.407476] Call Trace: [ 3236.407481] dump_stack+0x107/0x167 [ 3236.407485] check_noncircular+0x263/0x2e0 [ 3236.407491] ? stack_trace_consume_entry+0x160/0x160 [ 3236.407496] ? print_circular_bug+0x470/0x470 [ 3236.407500] ? memcpy+0x39/0x60 [ 3236.407505] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 3236.407510] __lock_acquire+0x29e7/0x5b00 [ 3236.407516] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3236.407521] ? __lockdep_reset_lock+0x180/0x180 [ 3236.407526] lock_acquire+0x197/0x490 [ 3236.407531] ? console_unlock+0x2e1/0xb40 [ 3236.407535] ? lock_release+0x6b0/0x6b0 [ 3236.407540] ? lock_downgrade+0x6d0/0x6d0 [ 3236.407545] ? do_raw_spin_lock+0x121/0x260 [ 3236.407550] ? rwlock_bug.part.0+0x90/0x90 [ 3236.407555] console_unlock+0x360/0xb40 [ 3236.407560] ? console_unlock+0x2e1/0xb40 [ 3236.407564] ? devkmsg_read+0x730/0x730 [ 3236.407569] ? lock_release+0x6b0/0x6b0 [ 3236.407574] ? do_raw_spin_unlock+0x4f/0x220 [ 3236.407579] ? vprintk_func+0x8b/0x140 [ 3236.407583] vprintk_emit+0x1de/0x4d0 [ 3236.407588] vprintk_func+0x8b/0x140 [ 3236.407591] printk+0xba/0xf1 [ 3236.407597] ? record_print_text.cold+0x16/0x16 [ 3236.407603] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3236.407607] should_fail+0x47a/0x5a0 [ 3236.407613] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3236.407618] ? tty_buffer_alloc+0x243/0x2b0 [ 3236.407622] should_failslab+0x5/0x20 [ 3236.407627] __kmalloc+0x72/0x3f0 [ 3236.407631] tty_buffer_alloc+0x243/0x2b0 [ 3236.407637] __tty_buffer_request_room+0x156/0x2a0 [ 3236.407643] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 3236.407649] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 3236.407654] pty_write+0xe6/0x110 [ 3236.407658] tty_send_xchar+0x29b/0x3c0 [ 3236.407663] ? tty_write_message+0x140/0x140 [ 3236.407668] n_tty_ioctl_helper+0x191/0x3a0 [ 3236.407673] n_tty_ioctl+0x56/0x370 [ 3236.407677] tty_ioctl+0x912/0x18b0 [ 3236.407682] ? n_tty_write_wakeup+0x40/0x40 [ 3236.407687] ? tty_fasync+0x390/0x390 [ 3236.407693] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 3236.407698] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 3236.407703] ? do_vfs_ioctl+0x283/0x10d0 [ 3236.407709] ? selinux_inode_getsecctx+0x90/0x90 [ 3236.407714] ? generic_block_fiemap+0x60/0x60 [ 3236.407719] ? __mutex_unlock_slowpath+0xe1/0x600 [ 3236.407724] ? selinux_file_ioctl+0xb1/0x260 [ 3236.407729] ? tty_fasync+0x390/0x390 [ 3236.407733] __x64_sys_ioctl+0x19a/0x210 [ 3236.407738] do_syscall_64+0x33/0x40 [ 3236.407744] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 3236.407748] RIP: 0033:0x7f196036eb19 [ 3236.407766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3236.407772] RSP: 002b:00007f195d8e4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3236.407784] RAX: ffffffffffffffda RBX: 00007f1960481f60 RCX: 00007f196036eb19 [ 3236.407792] RDX: 0000000000000003 RSI: 000000000000540a RDI: 0000000000000003 [ 3236.407799] RBP: 00007f195d8e41d0 R08: 0000000000000000 R09: 0000000000000000 [ 3236.407807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3236.407814] R13: 00007ffd04517acf R14: 00007f195d8e4300 R15: 0000000000022000 11:20:38 executing program 7: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x3, 0xffffffffffffffff, 0x8) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) mbind(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1, &(0x7f00000000c0)=0x6, 0x40, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x401) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0xffffffffffffffff) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/custom1\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000006, 0x11, r2, 0x590b8000) r3 = eventfd(0x6) fcntl$dupfd(r3, 0x406, r0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) 11:20:38 executing program 3: ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000000)) unshare(0x2a040600) unshare(0x0) unshare(0x800) clone3(&(0x7f00000000c0)={0xc1018700, 0x0, 0x0, 0x0, {0x80000006}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:20:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x8, 0x0, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) 11:20:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfdef) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000080)={0x0, 0x5, 0x4, 0x0, 0x0, "6f3c4f472ef12116a04e75e4ff908127bb5729"}) VM DIAGNOSIS: 11:20:38 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=dffffc0000000000 RCX=0000000000000000 RDX=0000000000000000 RSI=00000000ffffffff RDI=ffff88800ccd2208 RBP=ffff88800b29c2f0 RSP=ffff88800b5ef870 R8 =0000000000000001 R9 =ffffffff850dcb67 R10=0000000000000000 R11=0000000000000001 R12=0000000000200000 R13=ffffffff81761355 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff83e1f4f5 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f503e8788c0 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d221000 CR3=000000000e85a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=00000000000000006c6175747269762f XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000056106d414ef0000056106d40a640 XMM06=000056106d40a6000000000000000000 XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000020000000000000002000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822a8391 RDI=ffffffff8791c0e0 RBP=ffffffff8791c0a0 RSP=ffff88806cf09c90 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000020 R13=0000000000000020 R14=ffffffff8791c0a0 R15=dffffc0000000000 RIP=ffffffff822a83e8 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f195d8e4700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f195d8e3f78 CR3=00000000439b2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=ffffffffffffffffffffffffffffff00 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000